Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-01-01Council on Foreign RelationsCyber Operations Tracker
Longhorn
Longhorn
2019-01-01MITREMITRE ATT&CK
Group description: APT28
APT28
2019-01-01MITREMITRE ATT&CK
Group description: DragonOK
DragonOK
2019-01-01MITREMITRE ATT&CK
Group description: Magic Hound
APT35 Cleaver
2019-01-01Council on Foreign RelationsCyber Operations Tracker
Lazarus Group
Lazarus Group
2019-01-01MITREMITRE ATT&CK
Group description: Naikon
APT30 Naikon
2019-01-01MITREMITRE ATT&CK
Group description: Gorgon Group
The Gorgon Group
2019-01-01MITREMITRE ATT&CK
Group description: Charming Kitten
Charming Kitten
2019-01-01Council on Foreign RelationsCyber Operations Tracker
Magic Hound
APT35 Cleaver
2019-01-01Council on Foreign RelationsCyber Operations Tracker
APT 37
APT37
2019-01-01MITREMITRE ATT&CK
Group description: Group5
Group5
2019-01-01MITREMITRE ATT&CK
Tool description: China Chopper
CHINACHOPPER
2019-01-01CyberIntCyberInt
Legit Remote Admin Tools Turn into Threat Actors' Tools
RMS ServHelper TA505
2019-01-01Virus BulletinGabriela Nicolao
Inside Formbook infostealer
Formbook
2019-01-01Virus BulletinMaddie Stone
Unpacking the packed unpacker: reversing an Android anti-analysis native library
Chamois
2019-01-01CSISBenoît Ancel, Peter Kruse
Dreambot Business overview 2019
ISFB
2018-12-31Github RepositoryFrank Boldewin
FastCashMalwareDissected
FastCash
2018-12-30Github (Tomasuh)Tomasuh
Retefe unpacker
Retefe
2018-12-29Los Angeles TimesEmily Alpert Reyes, Meg James, Tony Barboza
Malware attack disrupts delivery of L.A. Times and Tribune papers across the U.S.
Ryuk
2018-12-28NetlabJiaYu
analysis of the infrastructure renewal and corresponding mode of transmission of the "double-gun" trojan horse