Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2013-09-06FireEyeNart Villeneuve, Thoufique Haq, Ned Moran
@online{villeneuve:20130906:evasive:1f16aab, author = {Nart Villeneuve and Thoufique Haq and Ned Moran}, title = {{Evasive Tactics: Taidoor}}, date = {2013-09-06}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2013/09/evasive-tactics-taidoor-3.html}, language = {English}, urldate = {2019-12-20} } Evasive Tactics: Taidoor
taidoor Taleret
2013-09-05Fox-ITFox IT
@online{it:20130905:large:48926bb, author = {Fox IT}, title = {{Large botnet cause of recent Tor network overload}}, date = {2013-09-05}, organization = {Fox-IT}, url = {https://blog.fox-it.com/2013/09/05/large-botnet-cause-of-recent-tor-network-overload/}, language = {English}, urldate = {2021-09-19} } Large botnet cause of recent Tor network overload
Mevade
2013-09-04Trend MicroDarin Dutcher
@online{dutcher:20130904:sykipot:8fffe0c, author = {Darin Dutcher}, title = {{Sykipot Now Targeting US Civil Aviation Sector Information}}, date = {2013-09-04}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/sykipot-now-targeting-us-civil-aviation-sector-information/}, language = {English}, urldate = {2019-12-05} } Sykipot Now Targeting US Civil Aviation Sector Information
sykipot
2013-09-04Trend MicroDarin Dutcher
@online{dutcher:20130904:sykipot:3c79c33, author = {Darin Dutcher}, title = {{Sykipot Now Targeting US Civil Aviation Sector Information}}, date = {2013-09-04}, organization = {Trend Micro}, url = {http://blog.trendmicro.com/trendlabs-security-intelligence/sykipot-now-targeting-us-civil-aviation-sector-information/}, language = {English}, urldate = {2020-01-08} } Sykipot Now Targeting US Civil Aviation Sector Information
APT4
2013-09-01Eternal TodoJose Miguel Esparza
@online{esparza:20130901:yet:d6bf0b6, author = {Jose Miguel Esparza}, title = {{Yet another Andromeda / Gamarue analysis}}, date = {2013-09-01}, organization = {Eternal Todo}, url = {https://eternal-todo.com/blog/yet-another-andromeda-gamarue-analysis}, language = {English}, urldate = {2020-01-10} } Yet another Andromeda / Gamarue analysis
Andromeda
2013-08-27AvastPeter Kálnai
@online{klnai:20130827:linux:02c05c7, author = {Peter Kálnai}, title = {{Linux Trojan “Hand of Thief” ungloved}}, date = {2013-08-27}, organization = {Avast}, url = {https://blog.avast.com/2013/08/27/linux-trojan-hand-of-thief-ungloved/}, language = {English}, urldate = {2020-03-02} } Linux Trojan “Hand of Thief” ungloved
Hand of Thief
2013-08-25AusCERTParth Shukla
@online{shukla:20130825:compromised:2881854, author = {Parth Shukla}, title = {{The Compromised Devices of the Carna Botnet}}, date = {2013-08-25}, organization = {AusCERT}, url = {https://docs.google.com/file/d/0BxMgdZPXsSLBN1ZuTUVDM1ZZV0k/edit}, language = {English}, urldate = {2020-08-18} } The Compromised Devices of the Carna Botnet
2013-08-23FireEyeNart Villeneuve, Thoufique Haq, Ned Moran
@online{villeneuve:20130823:operation:dc4b5d6, author = {Nart Villeneuve and Thoufique Haq and Ned Moran}, title = {{Operation Molerats: Middle East Cyber Attacks Using Poison Ivy}}, date = {2013-08-23}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html}, language = {English}, urldate = {2019-12-20} } Operation Molerats: Middle East Cyber Attacks Using Poison Ivy
Poison Ivy Molerats
2013-08-13MalwareTechMalwareTech
@online{malwaretech:20130813:powerloader:9853b70, author = {MalwareTech}, title = {{PowerLoader Injection – Something truly amazing}}, date = {2013-08-13}, organization = {MalwareTech}, url = {https://www.malwaretech.com/2013/08/powerloader-injection-something-truly.html}, language = {English}, urldate = {2020-07-15} } PowerLoader Injection – Something truly amazing
PowerLoader
2013-08-13KrebsOnSecurityBrian Krebs
@online{krebs:20130813:inside:5859892, author = {Brian Krebs}, title = {{Inside a ‘Reveton’ Ransomware Operation}}, date = {2013-08-13}, organization = {KrebsOnSecurity}, url = {https://krebsonsecurity.com/2012/08/inside-a-reveton-ransomware-operation/}, language = {English}, urldate = {2021-02-04} } Inside a ‘Reveton’ Ransomware Operation
Reveton
2013-08-12FireEyeNart Villeneuve, Ned Moran
@online{villeneuve:20130812:survival:4544f24, author = {Nart Villeneuve and Ned Moran}, title = {{Survival of the Fittest: New York Times Attackers Evolve Quickly}}, date = {2013-08-12}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2013/08/survival-of-the-fittest-new-york-times-attackers-evolve-quickly.html}, language = {English}, urldate = {2019-12-20} } Survival of the Fittest: New York Times Attackers Evolve Quickly
yayih
2013-08-12ContagioExchangeMila Parkour
@online{parkour:20130812:taleret:3969585, author = {Mila Parkour}, title = {{Taleret strings - APT (1)}}, date = {2013-08-12}, organization = {ContagioExchange}, url = {http://contagioexchange.blogspot.com/2013/08/taleret-strings-apt-1.html}, language = {English}, urldate = {2019-07-11} } Taleret strings - APT (1)
Taleret
2013-08-07RSALimor Kessem
@online{kessem:20130807:thieves:f60d69b, author = {Limor Kessem}, title = {{Thieves Reaching for Linux—”Hand of Thief” Trojan Targets Linux #INTH3WILD}}, date = {2013-08-07}, organization = {RSA}, url = {https://web.archive.org/web/20130815040638/https://blogs.rsa.com/thieves-reaching-for-linux-hand-of-thief-trojan-targets-linux-inth3wild/}, language = {English}, urldate = {2020-03-02} } Thieves Reaching for Linux—”Hand of Thief” Trojan Targets Linux #INTH3WILD
Hand of Thief
2013-08-07FireEyeIan Ahl, Tony Lee, Dennis Hanzlik
@online{ahl:20130807:breaking:aff06e9, author = {Ian Ahl and Tony Lee and Dennis Hanzlik}, title = {{Breaking Down the China Chopper Web Shell - Part I}}, date = {2013-08-07}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-chopper-web-shell-part-i.html}, language = {English}, urldate = {2019-12-20} } Breaking Down the China Chopper Web Shell - Part I
CHINACHOPPER
2013-08-02CitizenLabKatie Kleemola, Seth Hardy
@online{kleemola:20130802:surtr:a1bc558, author = {Katie Kleemola and Seth Hardy}, title = {{Surtr Malware Family Targeting the Tibetan Community}}, date = {2013-08-02}, organization = {CitizenLab}, url = {https://citizenlab.ca/2013/08/surtr-malware-family-targeting-the-tibetan-community/}, language = {English}, urldate = {2021-01-29} } Surtr Malware Family Targeting the Tibetan Community
surtr
2013-08-01Virus BulletinSuweera De Souza
@online{souza:20130801:andromeda:030b7db, author = {Suweera De Souza}, title = {{Andromeda 2.7 features}}, date = {2013-08-01}, organization = {Virus Bulletin}, url = {https://www.virusbulletin.com/virusbulletin/2013/08/andromeda-2-7-features}, language = {English}, urldate = {2020-01-09} } Andromeda 2.7 features
Andromeda
2013-08-01MalwarebytesJoshua Cannell
@online{cannell:20130801:sophos:404c6a5, author = {Joshua Cannell}, title = {{Sophos Discovers ZeroAccess Using RLO}}, date = {2013-08-01}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2013/08/sophos-discovers-zeroaccess-using-rlo/}, language = {English}, urldate = {2019-12-20} } Sophos Discovers ZeroAccess Using RLO
ZeroAccess
2013-07-31SecureworksJoe Stewart
@online{stewart:20130731:secrets:016bb04, author = {Joe Stewart}, title = {{Secrets of the Comfoo Masters}}, date = {2013-07-31}, organization = {Secureworks}, url = {https://www.secureworks.com/research/secrets-of-the-comfoo-masters}, language = {English}, urldate = {2021-01-27} } Secrets of the Comfoo Masters
Comfoo
2013-07-30ESET Researchwelivesecurity
@online{welivesecurity:20130730:versatile:30e5f2e, author = {welivesecurity}, title = {{Versatile and infectious: Win64/Expiro is a cross‑platform file infector}}, date = {2013-07-30}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2013/07/30/versatile-and-infectious-win64expiro-is-a-cross-platform-file-infector/}, language = {English}, urldate = {2022-02-14} } Versatile and infectious: Win64/Expiro is a cross‑platform file infector
Expiro
2013-07-25MalwarebytesJoshua Cannell
@online{cannell:20130725:zeroaccess:4853854, author = {Joshua Cannell}, title = {{ZeroAccess uses Self-Debugging}}, date = {2013-07-25}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2013/07/zeroaccess-anti-debug-uses-debugger/}, language = {English}, urldate = {2019-12-20} } ZeroAccess uses Self-Debugging
ZeroAccess