Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-02-01BitdefenderBitdefender Team
Operation PZCHAO Inside a highly specialized espionage infrastructure
Ghost RAT APT27
2018-02-01BitdefenderBogdan Botezatu, Ivona Alexandra Chili
Operation PZChao: a possible return of the Iron Tiger APT
APT27
2018-02-01Radware BlogPascal Geenens
JenX – Los Calvos de San Calvicie
JenX
2018-02-01Malware Traffic AnalysisBrad Duncan
Quick Test Drive of Trickbot (It now has a Monero Module)
TrickBot
2018-01-31Sophos Naked SecurityPaul Ducklin
What are “WannaMine” attacks, and how do I avoid them?
WannaMine
2018-01-31ProofpointKafeine
Smominru Monero mining botnet making millions for operators
MyKings Spreader Smominru
2018-01-30MalwarebytesMalwarebytes Labs
GandCrab ransomware distributed by RIG and GrandSoft exploit kits (updated)
Gandcrab
2018-01-29Vitali Kremez BlogVitali Kremez
Let's Learn: Dissecting FormBook Infostealer Malware: Crypter & "RunLib.dll"
Formbook
2018-01-29EscInSecurityEscInSecurity
Weekly TrickBot Analysis - End of w/c 22-Jan-2018 to 1000119
2018-01-29ProofpointDarien Huss
North Korea Bitten by Bitcoin Bug
Bitsran
2018-01-29Bleeping ComputerLawrence Abrams
GandCrab Ransomware Distributed by Exploit Kits, Appends GDCB Extension
Gandcrab
2018-01-29Palo Alto Networks Unit 42Juan Cortes, Tom Lancaster
VERMIN: Quasar RAT and Custom Malware Used In Ukraine
Vermin
2018-01-27Accenture SecurityAccenture Security, Bart Parys
LATEST CYBER ESPIONAGE MALWARE ATTACKS - DRAGONFISH DELIVERS NEW FORM OF ELISE MALWARE TARGETING ASEAN DEFENCE MINISTERS’ MEETING AND ASSOCIATES
Elise
2018-01-26Palo Alto Networks Unit 42Josh Grunzweig
The TopHat Campaign: Attacks Within The Middle East Region Using Popular Third-Party Services
Scote
2018-01-26Bleeping ComputerLawrence Abrams
The Velso Ransomware Being Manually Installed by Attackers
Velso
2018-01-26ESET ResearchMichal Poslušný
FriedEx: BitPaymer ransomware the work of Dridex authors
Dridex FriedEx
2018-01-25CrowdStrikeIan Barton, Jason Barnes, Karan Sood, Ryan McCombs
WannaMine Cryptomining: Harmless Nuisance or Disruptive Threat?
WannaMine
2018-01-25Palo Alto Networks Unit 42Robert Falcone
OilRig uses RGDoor IIS Backdoor on Targets in the Middle East
OilRig
2018-01-25Palo Alto Networks Unit 42Robert Falcone
OilRig uses RGDoor IIS Backdoor on Targets in the Middle East
RGDoor
2018-01-24ESET ResearchFilip Kafka
ESET’S GUIDE TODEOBFUSCATING AND DEVIRTUALIZING FINFISHER
FinFisher RAT