Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-02-15Palo Alto Networks Unit 42Kaoru Hayashi
Banking Trojans: Ursnif Global Distribution Networks Identified
Gozi
2017-02-15SecureworksSecureWorks' Counter Threat Unit Research Team
Iranian PupyRAT Bites Middle Eastern Organizations
pupy Cleaver
2017-02-15Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
Magic Hound Campaign Attacks Saudi Targets
Leash MPKBot pupy Rocket Kitten
2017-02-14ESET ResearchLukáš Štefanko
New Android trojan mimics user clicks to download dangerous malware
Unidentified APK 001
2017-02-14CERT.PLJarosław Jedynak
Sage 2.0 analysis
SAGE
2017-02-14Palo Alto Networks Unit 42Robert Falcone
XAgentOSX: Sofacy’s XAgent macOS Tool
X-Agent
2017-02-13RSARSA Research
KINGSLAYER – A SUPPLY CHAIN ATTACK
CodeKey PlugX
2017-02-12BAE SystemsBAE Systems Applied Intelligence
Lazarus & Watering-hole attacks
Ratankba
2017-02-12SymantecA L Johnson
Attackers target dozens of global banks with new malware
Ratankba Lazarus Group
2017-02-12SymantecA L Johnson
Attackers target dozens of global banks with new malware
Joanap Ratankba Sierra(Alfa,Bravo, ...) Lazarus Group
2017-02-10Wapack LabsAnonymous
Rebranding iSpy Keylogger: Gear Informer
GearInformer
2017-02-06Iran ThreatsClaudio Guarnieri, Collin Anderson
iKittens: Iranian Actor Resurfaces with Malware for Mac (MacDownloader)
MacDownloader Charming Kitten
2017-02-06Bleeping ComputerCatalin Cimpanu
Polish Banks Infected with Malware Hosted on Their Own Government's Site
2017-02-05VinRansomwareGregory Paul, Shaunak
Detailed threat analysis of Shamoon 2.0 Malware
DistTrack
2017-02-05IDFIDF
Hamas Uses Fake Facebook Profiles to Target Israeli Soldiers
GlanceLove
2017-02-04de VolkskrantHuib Modderkolk
Russen faalden bij hackpogingen ambtenaren op Nederlandse ministeries
APT28
2017-02-03Manuel K.-B.
Zeus Panda Webinjects: a case study
PandaBanker
2017-02-02Kaspersky LabsBrian Bartholomew
KopiLuwak: A New JavaScript Payload from Turla
KopiLuwak
2017-02-01ESET ResearchJean-Ian Boutin, Matthieu Faou
Read The Manual: A Guide to the RTM Banking Trojan
RTM RTM
2017-01-31SANS ISC InfoSec ForumsJohannes
Malicious Office files using fileless UAC bypass to drop KEYBASE malware
KeyBase