Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-03-08AvastThreat Intelligence Team
New investigations into the CCleaner incident point to a possible third stage that had keylogger capacities
CCleaner Backdoor
2018-03-08Kaspersky LabsGReAT
The devil’s in the Rich header
Olympic Destroyer
2018-03-08Kaspersky LabsGReAT
OlympicDestroyer is here to trick the industry
Olympic Destroyer
2018-03-08NetScoutDennis Schwarz, Hardik Modi, Jill Sopko, Richard Hummel
Donot Team Leverages New Modular Malware Framework in South Asia
VICEROY TIGER
2018-03-08McAfeeAsheer Malhotra, Charles Crawford, Jessica Saavedra-Morales, Ryan Sherstobitoff
Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant
Lazarus Group
2018-03-07InfoSec Handlers Diary BlogBrad Duncan
Ransomware news: GlobeImposter gets a facelift, GandCrab is still out there
Gandcrab GlobeImposter
2018-03-07ProofpointProofpoint Staff
Leaked Ammyy Admin Source Code Turned into Malware
FlawedAmmyy QuantLoader
2018-03-07Palo Alto Networks Unit 42Brandon Levene, Brittany Ash, Josh Grunzweig
Patchwork Continues to Deliver BADNEWS to the Indian Subcontinent
BadNews
2018-03-06Twitter (@demonslay335)Michael Gillespie
Tweet on Cryakl
Cryakl
2018-03-06Shusei Tomonaga
Malware “TSCookie”
PLEAD
2018-03-06Cisco TalosAdam Weller, Edmund Brumaghin, Holger Unterbrink
Gozi ISFB Remains Active in 2018, Leverages "Dark Cloud" Botnet For Distribution
ISFB
2018-03-05ConfiantJerome Dangu
Zirconium was one step ahead of Chrome’s redirect blocker with 0-day
HURRICANE PANDA
2018-03-05Github (TKCERT)TKCERT
Suricata rules to detect Winnti communication
Winnti
2018-03-05Palo Alto Networks Unit 42Brandon Levene, Josh Grunzweig
Sure, I’ll take that! New ComboJack Malware Alters Clipboards to Steal Cryptocurrency
Combojack
2018-03-04Youtube (OALabs)Sergei Frankoff
Unpacking Gootkit Malware With IDA Pro and X64dbg - Subscriber Request
Cold$eal GootKit
2018-03-02eideon blogTwitter (@darkquassar)
Tales of a Threat Hunter 2 Following the trace of WMI Backdoors & other nastiness
2018-03-02ReaqtaReaqta
Spear-phishing campaign leveraging on MSXSL
More_eggs
2018-03-02McAfeeRyan Sherstobitoff
McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups
Honeybee
2018-03-02KrabsOnSecurityMr. Krabs
Analysing Remcos RAT’s executable
Remcos
2018-03-02McAfeeAsheer Malhotra, Jessica Saavedra-Morales, Ryan Sherstobitoff, Thomas Roccia
McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups
Syscon