Click here to download all references as Bib-File.•
2016-01-29
⋅
Zscaler
⋅
Malicious Office Files Dropping Kasidet And Dridex Neutrino |
2015-11-10
⋅
CERT.PL
⋅
Talking to Dridex (part 0) – inside the dropper Dridex |
2015-10-26
⋅
Blueliv
⋅
Chasing cybercrime: network insights of Dyre and Dridex Trojan bankers Dridex Dyre |
2015-10-15
⋅
BitSight
⋅
Dridex: Chasing a botnet from the inside Dridex |
2015-10-13
⋅
Secureworks
⋅
Dridex (Bugat v5) Botnet Takeover Operation Dridex Evil Corp |
2014-03-06
⋅
Threatpost
⋅
Dexter, Project Hook POS Malware Campaigns Persist Project Hook POS |
2012-12-23
⋅
Contagio Dump
⋅
Dec 2012 Dexter - POS Infostealer samples and information Dexter |
2012-12-21
⋅
Trend Micro
⋅
Infostealer Dexter Targets Checkout Systems Dexter |
2012-12-13
⋅
SpiderLabs Blog
⋅
The Dexter Malware: Getting Your Hands Dirty |
2012-12-12
⋅
Volatility Labs
⋅
Unpacking Dexter POS "Memory Dump Parsing" Malware Dexter |
2012-08-03
⋅
Contagio Dump
⋅
Cridex Analysis using Volatility Feodo |
2012-08-02
⋅
Cridex Analysis using Volatility Feodo |