Click here to download all references as Bib-File.•
2015-08-05
⋅
Secureworks
⋅
Threat Group 3390 Cyberespionage |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-10
⋅
ESET Research
⋅
Sednit APT Group Meets Hacking Team |
2015-06-15
⋅
Secureworks
⋅
Stegoloader: A Stealthy Information Stealer StegoLoader |
2015-06-03
⋅
ClearSky
⋅
Thamar Reservoir – An Iranian cyber-attack campaign against targets in the Middle East Rocket Kitten |
2015-06-03
⋅
ClearSky
⋅
Thamar Reservoir – An Iranian cyber-attack campaign against targets in the Middle East SamSam |
2015-05-26
⋅
ESET Research
⋅
Moose – the router worm with an appetite for social networks Moose |
2015-05-19
⋅
ESET Research
⋅
Dissecting Linux/Moose Moose |
2015-05-01
⋅
ESET Research
⋅
CPL Malware in Brazil: Somewhere Between Banking Trojans and Malicious Emails Banload |
2015-04-29
⋅
ESET Research
⋅
Unboxing Linux/Mumblehard: Muttering spam from your servers |
2015-04-28
⋅
ESET Research
⋅
Unboxing Linux/Mumblehard: Muttering spam from your servers Mumblehard |
2015-04-09
⋅
ESET Research
⋅
Operation Buhtrap, the trap for Russian accountants Buhtrap BuhTrap |
2015-03-31
⋅
Check Point Research
⋅
Volatile Cedar - Analysis of a Global Cyber Espionage Campaign Volatile Cedar |
2015-03-09
⋅
ESET Research
⋅
CryptoFortress mimics TorrentLocker but is a different ransomware CryptoFortress |
2015-03-05
⋅
ESET Research
⋅
Casper Malware: After Babar and Bunny, Another Espionage Cartoon Casper |
2015-02-27
⋅
ThreatConnect
⋅
The Anthem Hack: All Roads Lead to China HttpBrowser |
2015-02-27
⋅
ThreatConnect
⋅
The Anthem Hack: All Roads Lead to China Derusbi |
2015-02-25
⋅
Trend Micro
⋅
OPERATION ARID VIPER: Bypassing the Iron Dome AridViper |
2015-02-01
⋅
Trend Micro
⋅
Operation Arid Viper - Bypassing the Iron Dome |