Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-11-04Check PointCheck Point
@online{point:20151104:offline:c78ce9c, author = {Check Point}, title = {{“Offline” Ransomware Encrypts Your Data without C&C Communication}}, date = {2015-11-04}, organization = {Check Point}, url = {https://blog.checkpoint.com/2015/11/04/offline-ransomware-encrypts-your-data-without-cc-communication/}, language = {English}, urldate = {2020-09-15} } “Offline” Ransomware Encrypts Your Data without C&C Communication
Cryakl
2015-11Check PointCheck Point
@techreport{point:201511:rocket:2e2b21c, author = {Check Point}, title = {{ROCKET KIT TEN: A CAMPAIGN WITH 9 LIVES}}, date = {2015-11}, institution = {Check Point}, url = {https://blog.checkpoint.com/wp-content/uploads/2015/11/rocket-kitten-report.pdf}, language = {English}, urldate = {2020-01-07} } ROCKET KIT TEN: A CAMPAIGN WITH 9 LIVES
FireMalv MPKBot Woolger Cleaver Rocket Kitten
2015-10Check PointStanislav Skuratovich, Aliaksandr Trafimchuk
@techreport{skuratovich:201510:digging:7c4fa84, author = {Stanislav Skuratovich and Aliaksandr Trafimchuk}, title = {{Digging for Groundhogs: Holes in your Linux server}}, date = {2015-10}, institution = {Check Point}, url = {https://blog.checkpoint.com/wp-content/uploads/2015/10/sb-report-threat-intelligence-groundhog.pdf}, language = {English}, urldate = {2020-01-08} } Digging for Groundhogs: Holes in your Linux server
XOR DDoS
2015-06-09Check PointCheck Point
@online{point:20150609:new:73a136b, author = {Check Point}, title = {{New Data: Volatile Cedar Malware Campaign}}, date = {2015-06-09}, organization = {Check Point}, url = {https://blog.checkpoint.com/2015/06/09/new-data-volatile-cedar/}, language = {English}, urldate = {2020-01-13} } New Data: Volatile Cedar Malware Campaign
Volatile Cedar
2015-06-01Check PointCheck Point
@online{point:20150601:troldesh:19531cf, author = {Check Point}, title = {{“Troldesh” – New Ransomware from Russia}}, date = {2015-06-01}, organization = {Check Point}, url = {https://blog.checkpoint.com/2015/06/01/troldesh-new-ransomware-from-russia/}, language = {English}, urldate = {2019-11-25} } “Troldesh” – New Ransomware from Russia
Troldesh
2015-05-15Check PointStanislav Skuratovich
@techreport{skuratovich:20150515:matsnu:850c41f, author = {Stanislav Skuratovich}, title = {{MATSNU}}, date = {2015-05-15}, institution = {Check Point}, url = {https://blog.checkpoint.com/wp-content/uploads/2015/07/matsnu-malwareid-technical-brief.pdf}, language = {English}, urldate = {2020-01-05} } MATSNU
Matsnu
2015-03-31Check Point ResearchCheck Point Research
@online{research:20150331:volatile:416807b, author = {Check Point Research}, title = {{Volatile Cedar - Analysis of a Global Cyber Espionage Campaign}}, date = {2015-03-31}, organization = {Check Point Research}, url = {https://blog.checkpoint.com/2015/03/31/volatilecedar/}, language = {English}, urldate = {2020-04-06} } Volatile Cedar - Analysis of a Global Cyber Espionage Campaign
Volatile Cedar
2015-03-30Check PointCheck Point
@techreport{point:20150330:volatile:35cc0a6, author = {Check Point}, title = {{Volatile Cedar}}, date = {2015-03-30}, institution = {Check Point}, url = {https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2015/03/20082004/volatile-cedar-technical-report.pdf}, language = {English}, urldate = {2022-10-07} } Volatile Cedar
Volatile Cedar