Click here to download all references as Bib-File.•
| 2012-02-01
⋅
Contagio Dump
⋅
TDL4 - Purple Haze (Pihar) Variant - sample and analysis Alureon |
| 2012-01-13
⋅
Middle East Online
⋅
Cyber war: 'Gaza hackers' deface Israel fire service website Molerats |
| 2012-01-12
⋅
Contagio Dump
⋅
Blackhole Ramnit - samples and analysis Ramnit |
| 2012-01-06
⋅
XyliBox
⋅
Cracking Cold$eal 5.4.1 FWB++ Cold$eal |
| 2012-01-06
⋅
Exploit-DB
⋅
Official Malware Report: Malware Reverse Engineering FakeRean |
| 2012-01-04
⋅
PCWorld
⋅
SpyEye Malware Borrows Zeus Trick to Mask Fraud SpyEye |
| 2012-01-01
⋅
Cobalt Strike
⋅
Cobalt Strike Website Cobalt Strike |
| 2012-01-01
⋅
Symantec
⋅
The Luckycat Hackers Lucky Cat |
| 2012-01-01
⋅
Trend Micro
⋅
Inside an APT Campaign with Multiple Targets in India and Japan Lucky Cat |
| 2012-01-01
⋅
CSIS Trend Micro
⋅
W32.Tinba (Tinybanker) The Turkish Incident Tinba |
| 2012-01-01
⋅
Symantec
⋅
W32.Qakbot in Detail QakBot |
| 2011-12-11
⋅
Open Security Research
⋅
Intro. To Reversing - W32Pinkslipbot QakBot |
| 2011-12-08
⋅
Symantec
⋅
The Sykipot Attacks sykipot |
| 2011-11-11
⋅
Project2049
⋅
The Chinese People’s Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure |
| 2011-10-31
⋅
Trend Micro
⋅
The Significance of the "Nitro" Attacks Nitro |
| 2011-10-26
⋅
Intego
⋅
Tsunami Backdoor Can Be Used for Denial of Service Attacks Tsunami |
| 2011-10-14
⋅
SANS
⋅
A Detailed Analysis of an Advanced Persistent Threat Malware ProjectWood |
| 2011-10-13
⋅
A Detailed Analysis of an Advanced Persistent Threat Malware woody |
| 2011-10-08
⋅
F-Secure
⋅
Possible Governmental Backdoor Found ("Case R2D2") Bundestrojaner |
| 2011-10-07
⋅
Contagiodump Blog
⋅
Rustock samples and analysis links. Rustock.C, E, I, J and other variants Rustock |