Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-11-20Palo Alto Networks Unit 42Anthony Kasza, Juan Cortes, Micah Yates
Operation Blockbuster Goes Mobile
HARDRAIN
2017-11-20MalwarebytesThomas Reed
OSX.Proton spreading through fake Symantec blog
Proton RAT
2017-11-20McAfeeInhee Han
Android Malware Appears Linked to Lazarus Cybercrime Group
HARDRAIN
2017-11-20Trend MicroFyodor Yarochkin, Lenart Bermejo, Ronnie Giagone
Cobalt Strikes Again: Spam Runs Use Macros and CVE-2017-8759 Exploit Against Russian Banks
More_eggs Cobalt
2017-11-19Arab NewsELISE KNUTSEN
Iranian agents blackmailed BBC reporter with ‘naked photo’ threats
Charming Kitten
2017-11-17LloydLabsLloyd Davies
[Part 1] - Analysing the New Linux/AES.DDoS IoT Malware
MrBlack
2017-11-16Github (mdsecactivebreach)Vincent Yiu
CACTUSTORCH: Payload Generation for Adversary Simulations
CACTUSTORCH
2017-11-16LookoutMichael Flossman
Tropic Trooper goes mobile with Titan surveillanceware
Titan APT23
2017-11-15Trend MicroRubio Wu
New EMOTET Hijacks a Windows API, Evades Sandbox and Analysis
Emotet
2017-11-14US-CERTUS-CERT
Alert (TA17-318B): HIDDEN COBRA – North Korean Trojan: Volgmer
Volgmer Lazarus Group
2017-11-14Palo Alto Networks Unit 42Tom Lancaster
Muddying the Water: Targeted Attacks in the Middle East
POWERSTATS MuddyWater
2017-11-14Department of Homeland SecurityDepartment of Homeland Security
HIDDEN COBRA – North Korean Remote Administration Tool: FALLCHILL
Lazarus Group
2017-11-14Digital GuardianChris Brook
IceID Banking Trojan Targeting Banks, Payment Card Providers, E-Commerce Sites
IcedID
2017-11-13Obscurity LabsObscurity Labs
Match Made In The Shadows: Part [3]
PeddleCheap
2017-11-13IntezerJay Rosenberg
IcedID Banking Trojan Shares Code with Pony 2.0 Trojan
IcedID IcedID Downloader
2017-11-13SecurityIntelligenceLimor Kessem, Maor Wiesen, Tal Darsan, Tomer Agayev
New Banking Trojan IcedID Discovered by IBM X-Force Research
IcedID IcedID Downloader
2017-11-12Vitali Kremez BlogVitali Kremez
Let's Learn: Dissecting Golroted Trojan's Process Hollowing Technique & UAC Bypass in HKCU\Environment
Golroted
2017-11-12MalwareBreakdown
Seamless Campaign Delivers Ramnit via RIG EK at 188.225.82.158. Follow-up Malware is AZORult Stealer.
Azorult
2017-11-10Palo Alto Networks Unit 42Jen Miller-Osborn, Josh Grunzweig
New Malware with Ties to SunOrcal Discovered
Reaver SunOrcal
2017-11-10CrowdStrikeKaran Sood
CCleaner Stage 2: In-Depth Analysis of the Payload
CCleaner Backdoor