Click here to download all references as Bib-File.•
2012-09-28
⋅
Dancho Danchev's Blog
⋅
Dissecting 'Operation Ababil' - an OSINT Analysis Cyber fighters of Izz Ad-Din Al Qassam |
2012-08-23
⋅
Trend Micro
⋅
The Taidoor Campaign: AN IN-DEPTH ANALYSIS taidoor Taidoor |
2012-08-20
⋅
Symantec
⋅
Crisis for Windows Sneaks onto Virtual Machines Crisis RCS |
2012-08-16
⋅
Symantec
⋅
The Shamoon Attacks DistTrack OilRig |
2012-08-16
⋅
Symantec
⋅
The Shamoon Attacks OilRig |
2012-08-16
⋅
Kaspersky Labs
⋅
Shamoon the Wiper – Copycats at Work DistTrack |
2012-08-10
⋅
Contagiodump Blog
⋅
Gauss samples - Nation-state cyber-surveillance + Banking trojan Gauss |
2012-08-03
⋅
Contagio Dump
⋅
Cridex Analysis using Volatility Feodo |
2012-08-02
⋅
Cridex Analysis using Volatility Feodo |
2012-07-26
⋅
Blog (Artem Baranov)
⋅
Investigation an interesting kernel mode stealer Lechiket |
2012-07-26
⋅
Kaspersky Labs
⋅
The Madi Campaign – Part II Madi |
2012-07-25
⋅
Threatpost
⋅
New and Improved Madi Spyware Campaign Continues Madi |
2012-07-22
⋅
Malware.lu
⋅
Xtreme RAT analysis Xtreme RAT |
2012-07-18
⋅
Symantec
⋅
The Madi Attacks: Series of Social Engineering Campaigns Madi |
2012-07-17
⋅
Kaspersky Labs
⋅
The Madi Campaign – Part I Madi |
2012-07-17
⋅
Symantec
⋅
The Madi Attacks: Series of Social Engineering Campaigns Madi |
2012-07-13
⋅
ESET Research
⋅
Rovnix bootkit framework updated Rovnix |
2012-07-02
⋅
AT&T
⋅
Sykipot is back sykipot |
2012-06-21
⋅
Contagio Dump
⋅
RAT samples from Syrian Targeted attacks - Blackshades RAT, XTreme RAT, Dark Comet RAT used by Syrian Electronic Army BlackShades DarkComet Terminator RAT |
2012-06-15
⋅
Malwarebytes
⋅
You Dirty RAT! Part 2 – BlackShades NET BlackShades |