Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-06-07GigamonChenming Xu, Dan Caselden, Jason Jones, Justin Warner
Adobe Flash Zero-Day Leveraged for Targeted Attack in Middle East - Gigamon ATR Blog
Chainshot
2017-05-31SymantecJon DiMaggio
Operation Bachosens: A detailed look into a long-running cyber crime campaign
Bachosens
2017-05-03FireEyeDJ Palombo, Jon Erickson, Matthew McWhirt
To SDB, Or Not To SDB: FIN7 Leveraging Shim Databases for Persistence
FIN7
2017-04-21The Wall Street JournalJonathan Cheng, Josh Chin
China Hacked South Korea Over Missile Defense, U.S. Firm Says
Tonto Team
2017-04-21The Wall Street JournalJonathan Cheng, Josh Chin
China Hacked South Korea Over Missile Defense, U.S. Firm Says
Tonto Team
2017-02-27CylanceJon Gross
The Deception Project: A New Japanese-Centric Threat
Snake Wine
2017-02-27Threat VectorJon Gross
The Deception Project: A New Japanese-Centric Threat
ChChes Snake Wine
2016-12-07Cisco TalosBen Baker, Edmund Brumaghin, Jonas Zaddach, Mariano Graziano
Floki Bot Strikes, Talos and Flashpoint Respond
FlokiBot
2016-05-17SymantecJon DiMaggio
Indian organizations targeted in Suckfly attacks
APT22
2016-05-17Fox-ITDanny Heppener, Erik de Jong, Krijn de Mik, Lennart Haagsma, Maarten van Dantzig, Martin van Hensbergen, Mitchel Sahertian, Yonathan Klijnsma, Yun Zheng Hu
Mofang: A politically motivated information stealing adversary
Shim RAT Mofang
2016-05-17SymantecJon DiMaggio
Indian organizations targeted in Suckfly attacks
2016-04-28SymantecJon DiMaggio
Tick cyberespionage group zeros in on Japan
Tick
2016-04-26Github (CyberMonitor)Jason Jones
New Poison Ivy Activity Targeting Myanmar, Asian Countries
Poison Ivy
2016-03-29SymantecJon DiMaggio
Taiwan targeted with new cyberespionage back doorTrojan
Budminer
2016-03-29SymantecJon DiMaggio
Taiwan targeted with new cyberespionage back door Trojan
Dripion Budminer
2016-03-15SymantecJon DiMaggio
Suckfly: Revealing the secret life of your code signing certificates
APT22
2016-03-15SymantecJon DiMaggio
Suckfly: Revealing the secret life of your code signing certificates
2016-02-23CylanceCylance SPEAR Team, Jon Gross
Operation Dust Storm
Misdat Poldat Dust Storm
2015-08-06SymantecJon DiMaggio
The Black Vine cyberespionage group
Sakula RAT APT19
2015-08-06SymantecJon DiMaggio
The Black Vine cyberespionage group
2015-05-13CylanceJon Gross
Cylance SPEAR Team: A Threat Actor Resurfaces
GreenShaitan
2015-05-02Barry Vengerik, Jonathan Wrolstad, Jordan Berry, Kristen Dennesen
HACKING THE STREET? FIN4 LIKELY PLAYING THE MARKET
WOLF SPIDER
2015-04-18FireEyeChris Phillips, Corbin Souffrant, Dan Caselden, Darien Kin, Genwei Jiang, James “Tom” Bennett, Jonathan Wrolstad, Joshua Homan, Yasir Khalid
Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack
APT28
2014-12-01FireEyeBarry Vengerik, Jonathan Wrolstad, Jordan Berry, Kristen Dennesen
FIN4: Stealing Insider Information for an Advantage in Stock Trading?
WOLF SPIDER
2014-03-01ESET ResearchAlexis Dorais-Joncas, Benjamin Vanheuverzwijn, Joan Calvet, Marc-Etienne M.Léveillé, Olivier Bilodeau, Pierre-Marc Bureau
OPERATION WINDIGO
Ebury
2013-09-17SymantecBranko Spasojevic, Jonell Baltazar, Jozsef Gegeny, Stephen Doherty
Hidden Lynx – Professional Hackers for Hire
9002 RAT HiKit APT17
2013-09-17SymantecBranko Spasojevic, Jonell Baltazar, Jozsef Gegeny, Stephen Doherty
Hidden Lynx – Professional Hackers for Hire
2013-05-01Norman SharkJonathan Camp, Morten Kråkvik, Ned Moran, Snorre Fagerland
Operation Hangover
Smackdown
2012-03-16ESET ResearchAlexis Dorais-Joncas
OSX/Imuler updated: still a threat on Mac OS X
iMuler