Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-11-28SecurityKitten BlogNick Hoffman
The KLRD Keylogger
KLRD
2016-09-20Deutsche Welleipj, kl
Hackers lurking, parliamentarians told
APT28
2016-06-02IBM X-Force ExchangeDoug Franklin
Suckfly APT
APT22
2016-05-17Fox-ITDanny Heppener, Erik de Jong, Krijn de Mik, Lennart Haagsma, Maarten van Dantzig, Martin van Hensbergen, Mitchel Sahertian, Yonathan Klijnsma, Yun Zheng Hu
Mofang: A politically motivated information stealing adversary
Shim RAT Mofang
2016-05-09Malware Traffic AnalysisBrad Duncan
PseudoDarkLeech Angler EK from 185.118.66.154 sends Bedep/CryptXXX
Bedep Unidentified 025 (Clickfraud)
2016-05-03SecureworksKevin Strickland
The Continuing Evolution of Samas Ransomware
SamSam BOSS SPIDER
2016-02-29SophosPaul Ducklin
The “HawkEye” attack: how cybercrooks target small businesses for big money
HawkEye Keylogger
2015-12-02BotconfPeter Kleissner
Sality: 2003 - Today
Sality
2015-11-300x3A SecurityYonathan Klijnsma
Inside Braviax/FakeRean: An analysis and history of a FakeAV family
2015-11-02SophosSophos
Troj/Cryakl-B
Cryakl
2015-08-27CitizenLabJohn Scott-Railton, Katie Kleemola
London Calling: Two-Factor Authentication Phishing From Iran
Rocket Kitten
2015-06-10Kleissner & AssociatesPeter Kleissner
Pony + Pkybot + Automated Transfer System = Banker
Pkybot
2015-01-15G DataG Data
Weiterentwicklung anspruchsvoller Spyware: von Agent.BTZ zu ComRAT
Agent.BTZ
2014-10-22Kaspersky LabsАртём Семенченко, Татьяна Куликова, Федор Синицын
Шифровальщик Cryakl или Фантомас разбушевался
Cryakl
2014-01-21Sophos Naked SecurityPaul Ducklin
Digitally signed data-stealing malware targets Mac users in “undelivered courier item” attack
Laoshu
2013-11-10FireEyeMike Scott, Ned Moran, Sai Omkar Vashisht, Thoufique Haq
Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method
9002 RAT
2013-08-25AusCERTParth Shukla
The Compromised Devices of the Carna Botnet
2013-08-12FireEyeNart Villeneuve, Ned Moran
Survival of the Fittest: New York Times Attackers Evolve Quickly
yayih
2013-08-02CitizenLabKatie Kleemola, Seth Hardy
Surtr Malware Family Targeting the Tibetan Community
surtr
2013-05-21Kleissner & AssociatesPeter Kleissner
News on MultiBanker, features now a jabber p2p functionality
Banjori
2013-03-26Kleissner & AssociatesPeter Kleissner
Behind MultiBanker, what the security industry doesn’t tell you and its money mule network
Banjori
2013-02-19ReutersJim Finkle, Joseph Menn
Exclusive: Apple, Macs hit by hackers who targeted Facebook
WildNeutron
2012-02-15Security IntelligenceAmit Klein
Merchant of Fraud Returns: Shylock Polymorphic Financial Malware Infections on the Rise
Shylock
2011-07-04Kernelmode.info Forumsrkhunter
WinNT/Rovnix (alias Mayachok, Cidox, BkLoader)
Rovnix
2007-10-22Kaspersky LabsKaspersky Labs
Malware-Entwicklung im ersten Halbjahr 2007
HxDef