Click here to download all references as Bib-File.•
2017-12-21
⋅
ESET Research
⋅
Sednit update: How Fancy Bear Spent the Year Seduploader X-Agent |
2017-12-20
⋅
CrowdStrike
⋅
An End to “Smash-and-Grab” and a Move to More Targeted Approaches CHINACHOPPER |
2017-12-20
⋅
RiskIQ
⋅
Mining Insights: Infrastructure Analysis of Lazarus Group Cyber Attacks on the Cryptocurrency Industry PowerRatankba |
2017-12-20
⋅
YouTube
⋅
Video about Catelites Bot - Airbank Example Catelites |
2017-12-20
⋅
Avast
⋅
New version of mobile malware Catelites possibly linked to Cron cyber gang Catelites |
2017-12-19
⋅
Lastline
⋅
Novel Excel Spreadsheet Attack Launches Password Stealing Malware Loki Bot Loki Password Stealer (PWS) |
2017-12-19
⋅
Trustwave
⋅
BrickerBot mod_plaintext Analysis BrickerBot |
2017-12-19
⋅
Proofpoint
⋅
North Korea Bitten by Bitcoin Bug: Financially motivated campaigns reveal new dimension of the Lazarus Group Ghost RAT |
2017-12-19
⋅
Trend Micro
⋅
Cyberespionage Campaign Sphinx Goes Mobile With AnubisSpy AnubisSpy |
2017-12-19
⋅
Vitali Kremez Blog
⋅
Let's Learn: Introducing New Trickbot LDAP "DomainGrabber" Module TrickBot |
2017-12-19
⋅
Proofpoint
⋅
North Korea Bitten by Bitcoin Bug QUICKCAFE PowerSpritz Ghost RAT PowerRatankba |
2017-12-18
⋅
Trend Micro
⋅
New GnatSpy Mobile Malware Family Discovered GnatSpy |
2017-12-18
⋅
NCCIC
⋅
Malware Analysis Report on Hatman Triton |
2017-12-18
⋅
eWeek
⋅
Collaborative Takedown Kills IoT Worm 'Satori' Satori |
2017-12-18
⋅
Kaspersky Labs
⋅
Jack of all trades Podec |
2017-12-18
⋅
Arbor Networks
⋅
MedusaHTTP DDoS Slithers Back into the Spotlight Medusa |
2017-12-18
⋅
⋅
LAC
⋅
Relationship between PlugX and attacker group "DragonOK" PlugX |
2017-12-17
⋅
Github (bytecode77)
⋅
r77 Rootkit r77 |
2017-12-15
⋅
Gradiant
⋅
In depth analysis of malware exploiting CVE-2017-11826 x4 |
2017-12-15
⋅
Palo Alto Networks Unit 42
⋅
Introducing the Adversary Playbook: First up, OilRig OilRig |