Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-09-23SnortSnort
@online{snort:20140923:malwarecnc:62903a0, author = {Snort}, title = {{MALWARE-CNC Win.Trojan.Aytoke variant outbound connection}}, date = {2014-09-23}, organization = {Snort}, url = {https://snort.org/rule_docs/1-34217}, language = {English}, urldate = {2021-09-19} } MALWARE-CNC Win.Trojan.Aytoke variant outbound connection
Aytoke
2014-09-23maldr0id blogŁukasz Siewierski
@online{siewierski:20140923:android:d2d9240, author = {Łukasz Siewierski}, title = {{Android malware based on SMS encryption and with KitKat support}}, date = {2014-09-23}, organization = {maldr0id blog}, url = {http://maldr0id.blogspot.ch/2014/09/android-malware-based-on-sms-encryption.html}, language = {English}, urldate = {2019-08-07} } Android malware based on SMS encryption and with KitKat support
Retefe
2014-09-22SecurityIntelligenceAssaf Regev, Tal Darsan
@online{regev:20140922:tinba:088fca0, author = {Assaf Regev and Tal Darsan}, title = {{Tinba Malware Reloaded and Attacking Banks Around the World}}, date = {2014-09-22}, organization = {SecurityIntelligence}, url = {http://securityintelligence.com/tinba-malware-reloaded-and-attacking-banks-around-the-world/}, language = {English}, urldate = {2020-01-09} } Tinba Malware Reloaded and Attacking Banks Around the World
Tinba
2014-09-21garage4hackersgarage4hackers
@online{garage4hackers:20140921:reversing:33b3a34, author = {garage4hackers}, title = {{Reversing Tinba: World's smallest trojan-banker DGA Code}}, date = {2014-09-21}, organization = {garage4hackers}, url = {http://garage4hackers.com/entry.php?b=3086}, language = {English}, urldate = {2019-07-11} } Reversing Tinba: World's smallest trojan-banker DGA Code
2014-09-19Palo Alto Networks Unit 42Jen Miller-Osborn, Ryan Olson
@online{millerosborn:20140919:recent:edf1ed3, author = {Jen Miller-Osborn and Ryan Olson}, title = {{Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy}}, date = {2014-09-19}, organization = {Palo Alto Networks Unit 42}, url = {https://researchcenter.paloaltonetworks.com/2014/09/recent-watering-hole-attacks-attributed-apt-group-th3bug-using-poison-ivy/}, language = {English}, urldate = {2019-12-20} } Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy
Poison Ivy
2014-09-19PWCTom Lancaster
@online{lancaster:20140919:malware:b8ce62a, author = {Tom Lancaster}, title = {{Malware microevolution}}, date = {2014-09-19}, organization = {PWC}, url = {http://pwc.blogs.com/cyber_security_updates/2014/09/malware-microevolution.html}, language = {English}, urldate = {2020-01-08} } Malware microevolution
RapidStealer
2014-09-19Palo Alto Networks Unit 42Jen Miller-Osborn, Ryan Olson
@online{millerosborn:20140919:recent:40ee862, author = {Jen Miller-Osborn and Ryan Olson}, title = {{Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy}}, date = {2014-09-19}, organization = {Palo Alto Networks Unit 42}, url = {http://researchcenter.paloaltonetworks.com/2014/09/recent-watering-hole-attacks-attributed-apt-group-th3bug-using-poison-ivy/}, language = {English}, urldate = {2019-12-20} } Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy
APT20
2014-09-11BleepingComputer ForumsDecrypterFixer
@online{decrypterfixer:20140911:torrentlocker:10d80ec, author = {DecrypterFixer}, title = {{TorrentLocker Ransomware Cracked and Decrypter has been made}}, date = {2014-09-11}, organization = {BleepingComputer Forums}, url = {http://www.bleepingcomputer.com/forums/t/547708/torrentlocker-ransomware-cracked-and-decrypter-has-been-made/}, language = {English}, urldate = {2020-01-06} } TorrentLocker Ransomware Cracked and Decrypter has been made
TorrentLocker
2014-09-05GoogleNeel Mehta, Billy Leonard, Shane Huntiey
@techreport{mehta:20140905:peering:8ce5720, author = {Neel Mehta and Billy Leonard and Shane Huntiey}, title = {{Peering Into the Aquarium: Analysis of a Sophisticated Multi-Stage Malware Family}}, date = {2014-09-05}, institution = {Google}, url = {https://assets.documentcloud.org/documents/3461560/Google-Aquarium-Clean.pdf}, language = {English}, urldate = {2020-07-30} } Peering Into the Aquarium: Analysis of a Sophisticated Multi-Stage Malware Family
X-Agent
2014-09-04ClearSkyClearSky Research Team
@online{team:20140904:gholee:9f6be42, author = {ClearSky Research Team}, title = {{Gholee – a “protective edge” themed spear phishing campaign}}, date = {2014-09-04}, organization = {ClearSky}, url = {https://www.clearskysec.com/gholee-a-protective-edge-themed-spear-phishing-campaign/}, language = {English}, urldate = {2020-01-10} } Gholee – a “protective edge” themed spear phishing campaign
Ghole
2014-09-04F-SecureF-Secure Labs
@online{labs:20140904:pitou:211eac4, author = {F-Secure Labs}, title = {{PITOU: The "silent" resurrection of the notorious Srizbi kernel spambot}}, date = {2014-09-04}, organization = {F-Secure}, url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.565.9211&rep=rep1&type=pdf}, language = {English}, urldate = {2021-09-09} } PITOU: The "silent" resurrection of the notorious Srizbi kernel spambot
Pitou
2014-09-04FireEyeMike Scott, James T. Bennett
@online{scott:20140904:forced:c6ce09b, author = {Mike Scott and James T. Bennett}, title = {{Forced to Adapt: XSLCmd Backdoor Now on OS X}}, date = {2014-09-04}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2014/09/forced-to-adapt-xslcmd-backdoor-now-on-os-x.html}, language = {English}, urldate = {2019-12-20} } Forced to Adapt: XSLCmd Backdoor Now on OS X
XSLCmd APT15
2014-09-03Trend MicroTrendmicro
@online{trendmicro:20140903:aldibot:e165a6f, author = {Trendmicro}, title = {{ALDIBOT}}, date = {2014-09-03}, organization = {Trend Micro}, url = {https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/aldibot}, language = {English}, urldate = {2019-12-02} } ALDIBOT
Aldibot
2014-09-03FireEyeNed Moran, Mike Oppenheim
@online{moran:20140903:darwins:1b05935, author = {Ned Moran and Mike Oppenheim}, title = {{Darwin’s Favorite APT Group}}, date = {2014-09-03}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2014/09/darwins-favorite-apt-group-2.html}, language = {English}, urldate = {2019-12-20} } Darwin’s Favorite APT Group
EtumBot ThreeByte WaterSpout APT12
2014-09WiredNumaan Huq
@techreport{huq:201409:pos:e79a593, author = {Numaan Huq}, title = {{PoS RAM Scraper Malware}}, date = {2014-09}, institution = {Wired}, url = {https://www.wired.com/wp-content/uploads/2014/09/wp-pos-ram-scraper-malware.pdf}, language = {English}, urldate = {2020-01-07} } PoS RAM Scraper Malware
Decebal rdasrv
2014-09Virus BulletinEugene Rodionov, Alexander Matrosov, David Harley
@techreport{rodionov:201409:bootkits:d55d6a7, author = {Eugene Rodionov and Alexander Matrosov and David Harley}, title = {{BOOTKITS: PAST, PRESENT & FUTURE}}, date = {2014-09}, institution = {Virus Bulletin}, url = {https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-RodionovMatrosov.pdf}, language = {English}, urldate = {2020-01-08} } BOOTKITS: PAST, PRESENT & FUTURE
Rovnix
2014-08-31StopMalvertisingKimberly
@online{kimberly:20140831:introduction:eb2cc6b, author = {Kimberly}, title = {{Introduction to the ZeroLocker ransomware}}, date = {2014-08-31}, organization = {StopMalvertising}, url = {http://stopmalvertising.com/malware-reports/introduction-to-the-zerolocker-ransomware.html}, language = {English}, urldate = {2020-01-13} } Introduction to the ZeroLocker ransomware
ZeroLocker
2014-08-29Trend MicroRhena Inocencio
@online{inocencio:20140829:new:43a114a, author = {Rhena Inocencio}, title = {{New BlackPOS Malware Emerges in the Wild, Targets Retail Accounts}}, date = {2014-08-29}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/new-blackpos-malware-emerges-in-the-wild-targets-retail-accounts/}, language = {English}, urldate = {2020-01-10} } New BlackPOS Malware Emerges in the Wild, Targets Retail Accounts
BlackPOS
2014-08-29FireEyeKyle Wilhoit, Thoufique Haq
@online{wilhoit:20140829:connecting:89f1651, author = {Kyle Wilhoit and Thoufique Haq}, title = {{Connecting the Dots: Syrian Malware Team Uses BlackWorm for Attacks}}, date = {2014-08-29}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2014/08/connecting-the-dots-syrian-malware-team-uses-blackworm-for-attacks.html}, language = {English}, urldate = {2019-12-20} } Connecting the Dots: Syrian Malware Team Uses BlackWorm for Attacks
Blackworm RAT
2014-08-29Kaspersky LabsCostin Raiu, Roel Schouwenberg, Ryan Naraine
@online{raiu:20140829:sinkholing:c8fbbad, author = {Costin Raiu and Roel Schouwenberg and Ryan Naraine}, title = {{Sinkholing the Backoff POS Trojan}}, date = {2014-08-29}, organization = {Kaspersky Labs}, url = {https://securelist.com/sinkholing-the-backoff-pos-trojan/66305/}, language = {English}, urldate = {2021-01-29} } Sinkholing the Backoff POS Trojan
Backoff POS