Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-01-10U.S. Department of Justice
@online{justice:20180110:phillip:d3877cf, author = {U.S. Department of Justice}, title = {{Phillip Durachinsky Indictment}}, date = {2018-01-10}, url = {https://www.documentcloud.org/documents/4346338-Phillip-Durachinsky-Indictment.html}, language = {English}, urldate = {2019-12-24} } Phillip Durachinsky Indictment
FruitFly
2018-01-09Jacquais
@online{jacquais:20180109:bestkorea:94b6c7a, author = {Jacquais}, title = {{BestKorea}}, date = {2018-01-09}, url = {https://github.com/Jacquais/BestKorea}, language = {English}, urldate = {2020-03-13} } BestKorea
BestKorea
2018-01-09Twitter (@struppigel)Karsten Hahn
@online{hahn:20180109:hiddentear:372b79c, author = {Karsten Hahn}, title = {{Tweet on HiddenTear Sample}}, date = {2018-01-09}, organization = {Twitter (@struppigel)}, url = {https://twitter.com/struppigel/status/950787783353884672}, language = {English}, urldate = {2019-12-04} } Tweet on HiddenTear Sample
HiddenTear
2018-01-08Github (YSCHGroup)YSCHGroup
@online{yschgroup:20180108:skyrat:adb4a1e, author = {YSCHGroup}, title = {{SkyRAT Powershell RAT}}, date = {2018-01-08}, organization = {Github (YSCHGroup)}, url = {https://github.com/YSCHGroup/SkyRAT}, language = {English}, urldate = {2020-01-09} } SkyRAT Powershell RAT
skyrat
2018-01-06CERT.PLPaweł Srokosz
@online{srokosz:20180106:ostap:619979b, author = {Paweł Srokosz}, title = {{Ostap malware analysis (Backswap dropper)}}, date = {2018-01-06}, organization = {CERT.PL}, url = {https://www.cert.pl/en/news/single/ostap-malware-analysis-backswap-dropper/}, language = {English}, urldate = {2020-01-09} } Ostap malware analysis (Backswap dropper)
ostap
2018-01-04Carnegie Endowment for International PeaceCollin Anderson, Karim Sadjapour
@online{anderson:20180104:irans:dcad15c, author = {Collin Anderson and Karim Sadjapour}, title = {{Iran’s Cyber Ecosystem: Who Are the Threat Actors?}}, date = {2018-01-04}, organization = {Carnegie Endowment for International Peace}, url = {https://carnegieendowment.org/2018/01/04/iran-s-cyber-ecosystem-who-are-threat-actors-pub-75140}, language = {English}, urldate = {2020-04-25} } Iran’s Cyber Ecosystem: Who Are the Threat Actors?
Magic Kitten
2018-01-04Malware Traffic AnalysisBrad Duncan
@online{duncan:20180104:malspam:ce2dfac, author = {Brad Duncan}, title = {{MALSPAM PUSHING PCRAT/GH0ST}}, date = {2018-01-04}, organization = {Malware Traffic Analysis}, url = {http://www.malware-traffic-analysis.net/2018/01/04/index.html}, language = {English}, urldate = {2019-12-24} } MALSPAM PUSHING PCRAT/GH0ST
Ghost RAT
2018-01-03CyberbitHod Gavriel
@online{gavriel:20180103:new:34da39b, author = {Hod Gavriel}, title = {{New LockPoS Malware Injection Technique}}, date = {2018-01-03}, organization = {Cyberbit}, url = {https://www.cyberbit.com/new-lockpos-malware-injection-technique/}, language = {English}, urldate = {2019-11-28} } New LockPoS Malware Injection Technique
LockPOS
2018-01-02Security 0wnageMo Bustami
@online{bustami:20180102:burping:c29dd52, author = {Mo Bustami}, title = {{Burping on MuddyWater}}, date = {2018-01-02}, organization = {Security 0wnage}, url = {https://sec0wn.blogspot.com/2018/02/burping-on-muddywater.html}, language = {English}, urldate = {2023-06-19} } Burping on MuddyWater
POWERSTATS
2018Group-IBGroup-IB
@techreport{groupib:2018:evolution:888e07c, author = {Group-IB}, title = {{The evolution of ransomware and its distribution methods}}, date = {2018}, institution = {Group-IB}, url = {https://go.group-ib.com/rs/689-LRE-818/images/Group-IB_Ransomware_whitepaper_eng.pdf}, language = {English}, urldate = {2021-02-09} } The evolution of ransomware and its distribution methods
GlobeImposter
2018-01-01nao_sec blognao_sec
@online{naosec:20180101:analyzing:0efde89, author = {nao_sec}, title = {{Analyzing Ramnit used in Seamless campaign}}, date = {2018-01-01}, organization = {nao_sec blog}, url = {http://www.nao-sec.org/2018/01/analyzing-ramnit-used-in-seamless.html}, language = {English}, urldate = {2020-01-08} } Analyzing Ramnit used in Seamless campaign
Ramnit
2018Council on Foreign RelationsCyber Operations Tracker
@online{tracker:2018:35:7c5b679, author = {Cyber Operations Tracker}, title = {{APT 35}}, date = {2018}, organization = {Council on Foreign Relations}, url = {https://www.cfr.org/cyber-operations/apt-35}, language = {English}, urldate = {2022-07-29} } APT 35
APT35
2018AccentureJoshua Ray, Alireza Salimi, Benjamin G. McCarthy
@techreport{ray:2018:monero:262d898, author = {Joshua Ray and Alireza Salimi and Benjamin G. McCarthy}, title = {{Monero and WannaMine: The cyber-criminal cryptocurrency and miner malware of choice}}, date = {2018}, institution = {Accenture}, url = {https://www.accenture.com/_acnmedia/PDF-46/Accenture-Threat-Analysis-Monero-Wannamine.pdf}, language = {English}, urldate = {2020-11-25} } Monero and WannaMine: The cyber-criminal cryptocurrency and miner malware of choice
WannaMine
2018MalpediaMalpedia
@online{malpedia:2018:family:7ea1bb3, author = {Malpedia}, title = {{Family Description: KleptoParasite Stealer}}, date = {2018}, organization = {Malpedia}, url = {https://malpedia.caad.fkie.fraunhofer.de/details/win.kleptoparasite_stealer}, language = {English}, urldate = {2020-01-13} } Family Description: KleptoParasite Stealer
KleptoParasite Stealer
2018RiskIQBrandon Dixon
@techreport{dixon:2018:alphathreat:f97b446, author = {Brandon Dixon}, title = {{Alphathreat Soup Burning Actors with Data}}, date = {2018}, institution = {RiskIQ}, url = {https://hitcon.org/2018/CMT/slide-files/d1_s2_r1.pdf}, language = {English}, urldate = {2021-08-09} } Alphathreat Soup Burning Actors with Data
2018Virus BulletinPaul Rascagnères, Warren Mercer
@online{rascagnres:2018:vb2018:121b1de, author = {Paul Rascagnères and Warren Mercer}, title = {{VB2018 paper: Who wasn’t responsible for Olympic Destroyer}}, date = {2018}, organization = {Virus Bulletin}, url = {https://www.virusbulletin.com/virusbulletin/2018/10/vb2018-paper-who-wasnt-responsible-olympic-destroyer/}, language = {English}, urldate = {2020-01-09} } VB2018 paper: Who wasn’t responsible for Olympic Destroyer
Olympic Destroyer
2018AccentureBart Parys, Joshua Ray
@techreport{parys:2018:dragonfish:68a7bc2, author = {Bart Parys and Joshua Ray}, title = {{Dragonfish delivers New Form of Elise Malware targeting ASEAN Defence Ministers' Meeting and Associates}}, date = {2018}, institution = {Accenture}, url = {https://www.accenture.com/t20180127T003755Z_w_/us-en/_acnmedia/PDF-46/Accenture-Security-Dragonfish-Threat-Analysis.pdf}, language = {English}, urldate = {2020-06-18} } Dragonfish delivers New Form of Elise Malware targeting ASEAN Defence Ministers' Meeting and Associates
Elise LOTUS PANDA
2018MandiantMandiant
@techreport{mandiant:2018:apt1:b76cc4d, author = {Mandiant}, title = {{APT1}}, date = {2018}, institution = {Mandiant}, url = {https://github.com/securitykitten/malware_references/blob/master/Appendix%20C%20(Digital)%20-%20The%20Malware%20Arsenal.pdf}, language = {English}, urldate = {2020-01-13} } APT1
Auriga Biscuit Bouncer Combos CookieBag Dairy GetMail GlooxMail Goggles Hacksfase Helauto Kurton ManItsMe MAPIget MiniASP NewsReels SeaSalt StarsyPound Sword TabMsgSQL Tarsip WebC2-AdSpace WebC2-Ausov WebC2-Bolid WebC2-Cson WebC2-DIV WebC2-GreenCat WebC2-Head WebC2-Kt3 WebC2-Qbp WebC2-Rave WebC2-Table WebC2-UGX WebC2-Yahoo
2018FireEyeFireEye
@online{fireeye:2018:apt38:20161b7, author = {FireEye}, title = {{APT38}}, date = {2018}, organization = {FireEye}, url = {https://content.fireeye.com/apt/rpt-apt38}, language = {English}, urldate = {2020-01-13} } APT38
Bitsran BLINDTOAD BOOTWRECK Contopee DarkComet DYEPACK HOTWAX NESTEGG PowerRatankba REDSHAWL WORMHOLE Lazarus Group
2018Quick HealQuick Heal
@techreport{heal:2018:complete:96388ed, author = {Quick Heal}, title = {{The Complete story of EMOTET Most prominent Malware of 2018}}, date = {2018}, institution = {Quick Heal}, url = {https://quickheal.co.in/documents/technical-paper/Whitepaper_HowToPM.pdf}, language = {English}, urldate = {2020-01-13} } The Complete story of EMOTET Most prominent Malware of 2018
Emotet