Click here to download all references as Bib-File.•
2018-02-01
⋅
Bitdefender
⋅
Operation PZCHAO Inside a highly specialized espionage infrastructure Ghost RAT APT27 |
2018-02-01
⋅
Bitdefender
⋅
Operation PZChao: a possible return of the Iron Tiger APT APT27 |
2018-02-01
⋅
Radware Blog
⋅
JenX – Los Calvos de San Calvicie JenX |
2018-02-01
⋅
Malware Traffic Analysis
⋅
Quick Test Drive of Trickbot (It now has a Monero Module) TrickBot |
2018-01-31
⋅
Sophos Naked Security
⋅
What are “WannaMine” attacks, and how do I avoid them? WannaMine |
2018-01-31
⋅
Proofpoint
⋅
Smominru Monero mining botnet making millions for operators MyKings Spreader Smominru |
2018-01-30
⋅
Malwarebytes
⋅
GandCrab ransomware distributed by RIG and GrandSoft exploit kits (updated) Gandcrab |
2018-01-29
⋅
Vitali Kremez Blog
⋅
Let's Learn: Dissecting FormBook Infostealer Malware: Crypter & "RunLib.dll" Formbook |
2018-01-29
⋅
EscInSecurity
⋅
Weekly TrickBot Analysis - End of w/c 22-Jan-2018 to 1000119 |
2018-01-29
⋅
Proofpoint
⋅
North Korea Bitten by Bitcoin Bug Bitsran |
2018-01-29
⋅
Bleeping Computer
⋅
GandCrab Ransomware Distributed by Exploit Kits, Appends GDCB Extension Gandcrab |
2018-01-29
⋅
Palo Alto Networks Unit 42
⋅
VERMIN: Quasar RAT and Custom Malware Used In Ukraine Vermin |
2018-01-27
⋅
Accenture Security
⋅
LATEST CYBER ESPIONAGE MALWARE ATTACKS - DRAGONFISH DELIVERS NEW FORM OF ELISE MALWARE TARGETING ASEAN DEFENCE MINISTERS’ MEETING AND ASSOCIATES Elise |
2018-01-26
⋅
Palo Alto Networks Unit 42
⋅
The TopHat Campaign: Attacks Within The Middle East Region Using Popular Third-Party Services Scote |
2018-01-26
⋅
Bleeping Computer
⋅
The Velso Ransomware Being Manually Installed by Attackers Velso |
2018-01-26
⋅
ESET Research
⋅
FriedEx: BitPaymer ransomware the work of Dridex authors Dridex FriedEx |
2018-01-25
⋅
CrowdStrike
⋅
WannaMine Cryptomining: Harmless Nuisance or Disruptive Threat? WannaMine |
2018-01-25
⋅
Palo Alto Networks Unit 42
⋅
OilRig uses RGDoor IIS Backdoor on Targets in the Middle East OilRig |
2018-01-25
⋅
Palo Alto Networks Unit 42
⋅
OilRig uses RGDoor IIS Backdoor on Targets in the Middle East RGDoor |
2018-01-24
⋅
ESET Research
⋅
ESET’S GUIDE TODEOBFUSCATING AND DEVIRTUALIZING FINFISHER FinFisher RAT |