Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-01-01AccentureAlireza Salimi, Benjamin G. McCarthy, Joshua Ray
Monero and WannaMine: The cyber-criminal cryptocurrency and miner malware of choice
WannaMine
2018-01-01Accenture SecurityGareth Russell, Joshua Ray, Kelly Bissell, Ryan LaSalle, Uwe Kissman
LATEST CYBER ESPIONAGE MALWARE ATTACKS
LOTUS PANDA
2018-01-01McAfeeItai Liba, James Walter, Ryan Sherstobitoff
Dissecting Operation Troy: Cyberespionage in South Korea
Lazarus Group
2017-12-20RiskIQYonathan Klijnsma
Mining Insights: Infrastructure Analysis of Lazarus Group Cyber Attacks on the Cryptocurrency Industry
PowerRatankba
2017-12-20AvastNikolaos Chrysaidos
New version of mobile malware Catelites possibly linked to Cron cyber gang
Catelites
2017-12-19Trend MicroMobile Threat Response Team
Cyberespionage Campaign Sphinx Goes Mobile With AnubisSpy
AnubisSpy
2017-12-11Trend MicroCedric Pernet, Daniel Lunghi, Jaromír Hořejší
Untangling the Patchwork Cyberespionage Group
Quasar RAT
2017-12-06The Citizen LabBill Marczak, Geoffrey Alexander, John Scott-Railton, Ron Deibert, Sarah McKune
Champing at the Cyberbit Ethiopian Dissidents Targeted with New Commercial Spyware
PC Surveillance System
2017-12-05ClearSky Research Team
Charming Kitten: Iranian Cyber Espionage Against Human Rights Activists, Academic Researchers and Media Outlets
DownPaper
2017-12-04EuropolEuropol
Andromeda botnet dismantled in international cyber operation
Andromeda
2017-12-01Trend MicroEcular Xu, Grey Guo
Cyberespionage Campaign Sphinx Goes Mobile With AnubisSpy
AnubisSpy
2017-11-20McAfeeInhee Han
Android Malware Appears Linked to Lazarus Cybercrime Group
HARDRAIN
2017-11-07SymantecSymantec Security Response
Sowbug: Cyber espionage group targets South American and Southeast Asian governments
Felismus StarLoader Sowbug
2017-11-02RiskIQYonathan Klijnsma
New Insights into Energetic Bear’s Watering Hole Cyber Attacks on Turkish Critical Infrastructure
ENERGETIC BEAR
2017-10-30Kaspersky LabsGhareeb Saad, Mohamad Amin Hasbini
Gaza Cybergang – updated activity in 2017:
Molerats
2017-10-27BellingcatCollin Anderson
Bahamut Revisited, More Cyber Espionage in the Middle East and South Asia
Bahamut Bahamut Bahamut
2017-10-26RiskIQYonathan Klijnsma
New htpRAT Gives Complete Remote Control Capabilities to Chinese Cyber Threat Actors
htpRAT
2017-10-24ClearSkyClearSky Research Team
Iranian Threat Agent Greenbug Impersonates Israeli High-Tech and Cyber Security Companies
ISMDoor
2017-10-24ClearSkyClearSky Research Team
Iranian Threat Agent Greenbug Impersonates Israeli High-Tech and Cyber Security Companies
Greenbug
2017-10-22CiscoPaul Rascagnères, Vitor Ventura, Warren Mercer
“Cyber Conflict” Decoy Document Used In Real Cyber Conflict
Seduploader