Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-05-13CylanceJon Gross
@online{gross:20150513:cylance:57a5597, author = {Jon Gross}, title = {{Cylance SPEAR Team: A Threat Actor Resurfaces}}, date = {2015-05-13}, organization = {Cylance}, url = {https://blog.cylance.com/spear-a-threat-actor-resurfaces}, language = {English}, urldate = {2019-10-15} } Cylance SPEAR Team: A Threat Actor Resurfaces
GreenShaitan
2015-05-10NextGovAliya Sternstein
@online{sternstein:20150510:thirdparty:c631abb, author = {Aliya Sternstein}, title = {{Third-Party Software Was Entry Point for Background-Check System Hack}}, date = {2015-05-10}, organization = {NextGov}, url = {https://www.nextgov.com/cybersecurity/2015/05/third-party-software-was-entry-point-background-check-system-hack/112354/}, language = {English}, urldate = {2020-01-08} } Third-Party Software Was Entry Point for Background-Check System Hack
APT19
2015-05-10root9broot9b
@techreport{root9b:20150510:apt28:1aab571, author = {root9b}, title = {{APT28 Targets Financial Markets}}, date = {2015-05-10}, institution = {root9b}, url = {https://www.root9b.com/sites/default/files/whitepapers/R9b_FSOFACY_0.pdf}, language = {English}, urldate = {2020-01-13} } APT28 Targets Financial Markets
2015-05-07G DataG Data
@online{data:20150507:dissecting:27b0271, author = {G Data}, title = {{Dissecting the “Kraken”}}, date = {2015-05-07}, organization = {G Data}, url = {https://www.gdatasoftware.com/blog/2015/05/24280-dissecting-the-kraken}, language = {English}, urldate = {2022-03-01} } Dissecting the “Kraken”
Laziok
2015-05-04Cisco TalosBen Baker, Alex Chiu
@online{baker:20150504:threat:726f1f2, author = {Ben Baker and Alex Chiu}, title = {{Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors}}, date = {2015-05-04}, organization = {Cisco Talos}, url = {http://blogs.cisco.com/security/talos/rombertik}, language = {English}, urldate = {2020-01-06} } Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors
Rombertik
2015-05-02Barry Vengerik, Kristen Dennesen, Jordan Berry, Jonathan Wrolstad
@techreport{vengerik:20150502:hacking:d57f34d, author = {Barry Vengerik and Kristen Dennesen and Jordan Berry and Jonathan Wrolstad}, title = {{HACKING THE STREET? FIN4 LIKELY PLAYING THE MARKET}}, date = {2015-05-02}, institution = {}, url = {https://www2.fireeye.com/rs/fireye/images/rpt-fin4.pdf}, language = {English}, urldate = {2019-12-17} } HACKING THE STREET? FIN4 LIKELY PLAYING THE MARKET
WOLF SPIDER
2015-05ESET ResearchMatías Porolli, Pablo Ramos
@techreport{porolli:201505:cpl:f373211, author = {Matías Porolli and Pablo Ramos}, title = {{CPL Malware in Brazil: Somewhere Between Banking Trojans and Malicious Emails}}, date = {2015-05}, institution = {ESET Research}, url = {https://www.welivesecurity.com/wp-content/uploads/2015/05/CPL-Malware-in-Brasil-zx02m.pdf}, language = {English}, urldate = {2019-12-17} } CPL Malware in Brazil: Somewhere Between Banking Trojans and Malicious Emails
Banload
2015-05FireEyeFireEye
@techreport{fireeye:201505:hiding:8695fc2, author = {FireEye}, title = {{HIDING IN PLAIN SIGHT: FIREEYE AND MICROSOFT EXPOSE OBFUSCATION TACTIC}}, date = {2015-05}, institution = {FireEye}, url = {https://www2.fireeye.com/rs/fireye/images/APT17_Report.pdf}, language = {English}, urldate = {2019-12-19} } HIDING IN PLAIN SIGHT: FIREEYE AND MICROSOFT EXPOSE OBFUSCATION TACTIC
BLACKCOFFEE
2015-05Kaspersky LabsKurt Baumgartner, Maxim Golovkin
@techreport{baumgartner:201505:msnmm:13a9145, author = {Kurt Baumgartner and Maxim Golovkin}, title = {{The MsnMM Campaigns - The Earliest Naikon APTCampaigns}}, date = {2015-05}, institution = {Kaspersky Labs}, url = {https://paper.seebug.org/papers/APT/APT_CyberCriminal_Campagin/2015/TheNaikonAPT-MsnMM1.pdf}, language = {English}, urldate = {2019-07-11} } The MsnMM Campaigns - The Earliest Naikon APTCampaigns
SslMM Sys10 WinMM xsPlus
2015-04-29ESET ResearchESET Research
@online{research:20150429:unboxing:44bea52, author = {ESET Research}, title = {{Unboxing Linux/Mumblehard: Muttering spam from your servers}}, date = {2015-04-29}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2015/04/29/unboxing-linuxmumblehard-muttering-spam-servers/}, language = {English}, urldate = {2022-05-11} } Unboxing Linux/Mumblehard: Muttering spam from your servers
2015-04-28ESET ResearchMarc-Etienne M.Léveillé
@techreport{mlveill:20150428:unboxing:647ba0d, author = {Marc-Etienne M.Léveillé}, title = {{Unboxing Linux/Mumblehard: Muttering spam from your servers}}, date = {2015-04-28}, institution = {ESET Research}, url = {https://www.welivesecurity.com/wp-content/uploads/2015/04/mumblehard.pdf}, language = {English}, urldate = {2022-05-11} } Unboxing Linux/Mumblehard: Muttering spam from your servers
Mumblehard
2015-04-28LookingGlassLookingGlass
@techreport{lookingglass:20150428:operation:68a342f, author = {LookingGlass}, title = {{Operation Armageddon: Cyber Espionage as a Strategic Component of Russian Modern Warfare}}, date = {2015-04-28}, institution = {LookingGlass}, url = {https://www.lookingglasscyber.com/wp-content/uploads/2015/08/Operation_Armageddon_Final.pdf}, language = {English}, urldate = {2020-01-13} } Operation Armageddon: Cyber Espionage as a Strategic Component of Russian Modern Warfare
Gamaredon Group
2015-04-27Cisco TalosAndrea Allievi, Earl Carter, Emmanuel Tacheau
@online{allievi:20150427:threat:3754b13, author = {Andrea Allievi and Earl Carter and Emmanuel Tacheau}, title = {{Threat Spotlight: TeslaCrypt – Decrypt It Yourself}}, date = {2015-04-27}, organization = {Cisco Talos}, url = {https://blogs.cisco.com/security/talos/teslacrypt}, language = {English}, urldate = {2019-10-15} } Threat Spotlight: TeslaCrypt – Decrypt It Yourself
TeslaCrypt
2015-04-27PWCTom Lancaster
@online{lancaster:20150427:attacks:8467adc, author = {Tom Lancaster}, title = {{Attacks against Israeli & Palestinian interests}}, date = {2015-04-27}, organization = {PWC}, url = {https://pwc.blogs.com/cyber_security_updates/2015/04/attacks-against-israeli-palestinian-interests.html}, language = {English}, urldate = {2020-01-08} } Attacks against Israeli & Palestinian interests
Molerats
2015-04-18FireEyeDan Caselden, Yasir Khalid, James “Tom” Bennett, Genwei Jiang, Corbin Souffrant, Joshua Homan, Jonathan Wrolstad, Chris Phillips, Darien Kin
@online{caselden:20150418:operation:f2f3cba, author = {Dan Caselden and Yasir Khalid and James “Tom” Bennett and Genwei Jiang and Corbin Souffrant and Joshua Homan and Jonathan Wrolstad and Chris Phillips and Darien Kin}, title = {{Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack}}, date = {2015-04-18}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html}, language = {English}, urldate = {2019-10-16} } Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack
APT28
2015-04-17Eternal TodoJose Miguel Esparza
@online{esparza:20150417:andromedagamarue:2330f4e, author = {Jose Miguel Esparza}, title = {{Andromeda/Gamarue bot loves JSON too (new versions details)}}, date = {2015-04-17}, organization = {Eternal Todo}, url = {https://eternal-todo.com/blog/andromeda-gamarue-loves-json}, language = {English}, urldate = {2020-01-10} } Andromeda/Gamarue bot loves JSON too (new versions details)
Andromeda
2015-04-15TrustwaveEric Merritt
@online{merritt:20150415:new:ed6921d, author = {Eric Merritt}, title = {{New POS Malware Emerges - Punkey}}, date = {2015-04-15}, organization = {Trustwave}, url = {https://www.trustwave.com/Resources/SpiderLabs-Blog/New-POS-Malware-Emerges---Punkey/}, language = {English}, urldate = {2020-01-08} } New POS Malware Emerges - Punkey
Punkey POS
2015-04-15Kaspersky LabsCostin Raiu, Maxim Golovkin
@online{raiu:20150415:chronicles:aa4af84, author = {Costin Raiu and Maxim Golovkin}, title = {{The Chronicles of the Hellsing APT: the Empire Strikes Back}}, date = {2015-04-15}, organization = {Kaspersky Labs}, url = {https://securelist.com/the-chronicles-of-the-hellsing-apt-the-empire-strikes-back/69567/}, language = {English}, urldate = {2021-02-06} } The Chronicles of the Hellsing APT: the Empire Strikes Back
GRILLMARK Hellsing
2015-04-15FireEyeFireEye
@techreport{fireeye:20150415:apt30:d09a09c, author = {FireEye}, title = {{APT30 and the Mechanics of a Long-Running Cyber Espionage Campaign}}, date = {2015-04-15}, institution = {FireEye}, url = {https://www.mandiant.com/sites/default/files/2021-09/rpt-apt30.pdf}, language = {English}, urldate = {2022-08-25} } APT30 and the Mechanics of a Long-Running Cyber Espionage Campaign
backspace FLASHFLOOD NETEAGLE SHIPSHAPE SPACESHIP APT30
2015-04-15XyliBoxXylitol
@online{xylitol:20150415:betabot:0f2f804, author = {Xylitol}, title = {{Betabot retrospective}}, date = {2015-04-15}, organization = {XyliBox}, url = {http://www.xylibox.com/2015/04/betabot-retrospective.html}, language = {English}, urldate = {2020-01-13} } Betabot retrospective
BetaBot