Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2012-03-06Malekal ForumVarious
@online{various:20120306:virus:cc1aa6d, author = {Various}, title = {{Virus Ukash Gendarmerie Absence twexx32.dll}}, date = {2012-03-06}, organization = {Malekal Forum}, url = {https://forum.malekal.com/viewtopic.php?t=36485&start=}, language = {English}, urldate = {2020-01-06} } Virus Ukash Gendarmerie Absence twexx32.dll
Ransomlock
2012-03-02ESET ResearchAleksandr Matrosov, Eugene Rodionov, Dmitry Volkov, David Harley
@techreport{matrosov:20120302:win32carberp:638558a, author = {Aleksandr Matrosov and Eugene Rodionov and Dmitry Volkov and David Harley}, title = {{Win32/Carberp: When You're in a Black Hole, Stop Digging}}, date = {2012-03-02}, institution = {ESET Research}, url = {https://cdn1.esetstatic.com/eset/US/resources/docs/white-papers/white-papers-win-32-carberp.pdf}, language = {English}, urldate = {2020-02-11} } Win32/Carberp: When You're in a Black Hole, Stop Digging
Carberp
2012-03SymantecSymantec
@techreport{symantec:201203:luckycat:ddeba84, author = {Symantec}, title = {{The Luckycat Hackers}}, date = {2012-03}, institution = {Symantec}, url = {https://vx-underground.org/papers/luckycat-hackers-12-en.pdf}, language = {English}, urldate = {2020-04-21} } The Luckycat Hackers
Lucky Cat
2012-02-22SymantecSymantec
@online{symantec:20120222:trojanransomlockj:75eb419, author = {Symantec}, title = {{Trojan.Ransomlock.J}}, date = {2012-02-22}, organization = {Symantec}, url = {https://www.symantec.com/security_response/writeup.jsp?docid=2012-022215-2340-99&tabid=2}, language = {English}, urldate = {2020-01-09} } Trojan.Ransomlock.J
Ransomlock
2012-02-15Security IntelligenceAmit Klein
@online{klein:20120215:merchant:b6f5565, author = {Amit Klein}, title = {{Merchant of Fraud Returns: Shylock Polymorphic Financial Malware Infections on the Rise}}, date = {2012-02-15}, organization = {Security Intelligence}, url = {https://securityintelligence.com/merchant-of-fraud-returns-shylock-polymorphic-financial-malware-infections-on-the-rise/}, language = {English}, urldate = {2019-11-23} } Merchant of Fraud Returns: Shylock Polymorphic Financial Malware Infections on the Rise
Shylock
2012-02-10tracker.h3x.euMalware Corpus Tracker
@online{tracker:20120210:info:d58b5c1, author = {Malware Corpus Tracker}, title = {{Info for Family: plugx}}, date = {2012-02-10}, organization = {tracker.h3x.eu}, url = {https://tracker.h3x.eu/info/290}, language = {English}, urldate = {2021-06-24} } Info for Family: plugx
PlugX
2012-02-01Contagio DumpMila Parkour
@online{parkour:20120201:tdl4:e13618a, author = {Mila Parkour}, title = {{TDL4 - Purple Haze (Pihar) Variant - sample and analysis}}, date = {2012-02-01}, organization = {Contagio Dump}, url = {http://contagiodump.blogspot.com/2012/02/purple-haze-bootkit.html}, language = {English}, urldate = {2019-12-20} } TDL4 - Purple Haze (Pihar) Variant - sample and analysis
Alureon
2012-01-13Middle East OnlineMiddle East Online
@online{online:20120113:cyber:de2ee6e, author = {Middle East Online}, title = {{Cyber war: 'Gaza hackers' deface Israel fire service website}}, date = {2012-01-13}, organization = {Middle East Online}, url = {https://middle-east-online.com/en/cyber-war-gaza-hackers-deface-israel-fire-service-website}, language = {English}, urldate = {2019-10-12} } Cyber war: 'Gaza hackers' deface Israel fire service website
Molerats
2012-01-12Contagio DumpMila Parkour
@online{parkour:20120112:blackhole:c99cf1f, author = {Mila Parkour}, title = {{Blackhole Ramnit - samples and analysis}}, date = {2012-01-12}, organization = {Contagio Dump}, url = {http://contagiodump.blogspot.com/2012/01/blackhole-ramnit-samples-and-analysis.html}, language = {English}, urldate = {2019-12-20} } Blackhole Ramnit - samples and analysis
Ramnit
2012-01-08XyliBoxXylitol
@online{xylitol:20120108:coldeal:2a4bafe, author = {Xylitol}, title = {{Cold$eal: 'Situation is under control'}}, date = {2012-01-08}, organization = {XyliBox}, url = {https://www.xylibox.com/2012/01/coldeal-situation-is-under-control.html}, language = {English}, urldate = {2020-11-26} } Cold$eal: 'Situation is under control'
Cold$eal
2012-01-06XyliBoxXylitol
@online{xylitol:20120106:cracking:8add3f8, author = {Xylitol}, title = {{Cracking Cold$eal 5.4.1 FWB++}}, date = {2012-01-06}, organization = {XyliBox}, url = {https://www.xylibox.com/2012/01/cracking-coldeal-541-fwb.html}, language = {English}, urldate = {2020-11-26} } Cracking Cold$eal 5.4.1 FWB++
Cold$eal
2012-01-06Exploit-DBRick Flores
@techreport{flores:20120106:official:5984bcc, author = {Rick Flores}, title = {{Official Malware Report: Malware Reverse Engineering}}, date = {2012-01-06}, institution = {Exploit-DB}, url = {https://www.exploit-db.com/docs/english/18387-malware-reverse-engineering-part-1---static-analysis.pdf}, language = {English}, urldate = {2020-01-09} } Official Malware Report: Malware Reverse Engineering
FakeRean
2012-01-04PCWorldJeremy Kirk
@online{kirk:20120104:spyeye:3ecb013, author = {Jeremy Kirk}, title = {{SpyEye Malware Borrows Zeus Trick to Mask Fraud}}, date = {2012-01-04}, organization = {PCWorld}, url = {https://www.pcworld.com/article/247252/spyeye_malware_borrows_zeus_trick_to_mask_fraud.html}, language = {English}, urldate = {2020-01-08} } SpyEye Malware Borrows Zeus Trick to Mask Fraud
SpyEye
2012Trend MicroForward-Looking Threat Research Team
@techreport{team:2012:inside:f112987, author = {Forward-Looking Threat Research Team}, title = {{Inside an APT Campaign with Multiple Targets in India and Japan}}, date = {2012}, institution = {Trend Micro}, url = {https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp_luckycat_redux.pdf}, language = {English}, urldate = {2020-01-08} } Inside an APT Campaign with Multiple Targets in India and Japan
Lucky Cat
2012SymantecVarious
@techreport{various:2012:luckycat:4901720, author = {Various}, title = {{The Luckycat Hackers}}, date = {2012}, institution = {Symantec}, url = {https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the_luckycat_hackers.pdf}, language = {English}, urldate = {2020-01-08} } The Luckycat Hackers
Lucky Cat
2012Cobalt StrikeCobalt Strike
@online{strike:2012:cobalt:8522cdd, author = {Cobalt Strike}, title = {{Cobalt Strike Website}}, date = {2012}, organization = {Cobalt Strike}, url = {https://www.cobaltstrike.com/support}, language = {English}, urldate = {2020-01-13} } Cobalt Strike Website
Cobalt Strike
2012SymantecNicolas Falliere
@techreport{falliere:2012:w32qakbot:974b5b5, author = {Nicolas Falliere}, title = {{W32.Qakbot in Detail}}, date = {2012}, institution = {Symantec}, url = {http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_qakbot_in_detail.pdf}, language = {English}, urldate = {2019-11-28} } W32.Qakbot in Detail
QakBot
2012Norman ASASnorre Fagerland
@techreport{fagerland:2012:many:c938856, author = {Snorre Fagerland}, title = {{The many faces of Gh0st Rat}}, date = {2012}, institution = {Norman ASA}, url = {http://download01.norman.no/documents/ThemanyfacesofGh0stRat.pdf}, language = {English}, urldate = {2019-12-20} } The many faces of Gh0st Rat
Ghost RAT
2012CSIS Trend MicroPeter Kruse (CSIS), Feike Hacquebord (Trend Micro), Robert McArdle (Trend Micro)
@techreport{csis:2012:w32tinba:542635f, author = {Peter Kruse (CSIS) and Feike Hacquebord (Trend Micro) and Robert McArdle (Trend Micro)}, title = {{W32.Tinba (Tinybanker) The Turkish Incident}}, date = {2012}, institution = {CSIS Trend Micro}, url = {http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_w32-tinba-tinybanker.pdf}, language = {English}, urldate = {2019-12-24} } W32.Tinba (Tinybanker) The Turkish Incident
Tinba
2011-12-08SymantecVikram Thakur
@online{thakur:20111208:sykipot:cf66ef3, author = {Vikram Thakur}, title = {{The Sykipot Attacks}}, date = {2011-12-08}, organization = {Symantec}, url = {https://www.symantec.com/connect/blogs/sykipot-attacks}, language = {English}, urldate = {2019-10-15} } The Sykipot Attacks
sykipot