Click here to download all references as Bib-File.•
2015-08-05
⋅
Secureworks
⋅
Threat Group 3390 Cyberespionage |
2015-08-05
⋅
Ars Technica
⋅
Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes” APT27 |
2015-08-05
⋅
Black Hat
⋅
Gameover Zeus – Bad Guys and Backends Gameover P2P |
2015-08-01
⋅
Arbor Networks
⋅
Uncovering the Seven Pointed Dagger 9002 RAT EvilGrab PlugX Trochilus RAT APT9 |
2015-07-31
⋅
AlienVault OTX
⋅
OTX: FBI Flash #68 (PlugX) APT9 |
2015-07-31
⋅
AlienVault
⋅
OTX Pulse on PlugX |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-30
⋅
Secureworks
⋅
Sakula Malware Family Sakula RAT |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-27
⋅
Palo Alto Networks Unit 42
⋅
UPS: Observations on CVE-2015-3113, Prior Zero-Days and the Pirpi Payload pirpi |
2015-07-23
⋅
SecurityIntelligence
⋅
An Analysis of the Qadars Banking Trojan Qadars |
2015-07-22
⋅
F-Secure
⋅
Duke APT group's latest tools: cloud services and Linux support CloudDuke |
2015-07-20
⋅
paloalto Networks Unit 42
⋅
Watering Hole Attack on Aerospace Firm Exploits CVE-2015-5122 to Install IsSpace Backdoor IsSpace |
2015-07-19
⋅
Johannes Bader Blog
⋅
The Faulty Precursor of Pykspa's DGA Pykspa |
2015-07-14
⋅
BernhardPOS BernhardPOS |
2015-07-14
⋅
Kaspersky Labs
⋅
TeslaCrypt 2.0 disguised as CryptoWall TeslaCrypt |
2015-07-13
⋅
Symantec
⋅
“Forkmeiamfamous”: Seaduke, latest weapon in the Duke armory SEADADDY |
2015-07-10
⋅
ESET Research
⋅
Sednit APT Group Meets Hacking Team |
2015-07-08
⋅
Symantec
⋅
Butterfly: Profiting from high-level corporate attacks WildNeutron |
2015-07-08
⋅
Kaspersky Labs
⋅
Wild Neutron – Economic espionage threat actor returns with new tricks JripBot |