Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2013-01-18Brian Krebs
@online{krebs:20130118:polish:d1c0560, author = {Brian Krebs}, title = {{Polish Takedown Targets ‘Virut’ Botnet}}, date = {2013-01-18}, url = {https://krebsonsecurity.com/2013/01/polish-takedown-targets-virut-botnet/}, language = {English}, urldate = {2019-12-18} } Polish Takedown Targets ‘Virut’ Botnet
Virut
2013-01-17Kaspersky LabsGReAT
@online{great:20130117:red:77d6972, author = {GReAT}, title = {{“Red October” – Part Two, the Modules}}, date = {2013-01-17}, organization = {Kaspersky Labs}, url = {https://securelist.com/red-october-part-two-the-modules/57645}, language = {English}, urldate = {2022-08-25} } “Red October” – Part Two, the Modules
Inception Framework
2013-01-14Kaspersky LabsGReAT
@online{great:20130114:red:ac55753, author = {GReAT}, title = {{"Red October" Diplomatic Cyber Attacks Investigation}}, date = {2013-01-14}, organization = {Kaspersky Labs}, url = {https://securelist.com/red-october-diplomatic-cyber-attacks-investigation/36740/}, language = {English}, urldate = {2020-04-06} } "Red October" Diplomatic Cyber Attacks Investigation
Inception Framework
2013-01-14Kaspersky LabsGReAT
@online{great:20130114:red:0e66739, author = {GReAT}, title = {{The “Red October” Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies}}, date = {2013-01-14}, organization = {Kaspersky Labs}, url = {https://securelist.com/the-red-october-campaign/57647}, language = {English}, urldate = {2022-08-25} } The “Red October” Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies
Inception Framework
2013-01-14Kaspersky LabsGReAT
@online{great:20130114:red:a347681, author = {GReAT}, title = {{“Red October” Diplomatic Cyber Attacks Investigation}}, date = {2013-01-14}, organization = {Kaspersky Labs}, url = {https://securelist.com/red-october-diplomatic-cyber-attacks-investigation/36740}, language = {English}, urldate = {2022-08-25} } “Red October” Diplomatic Cyber Attacks Investigation
Inception Framework
2013-01-02Eric Romang
@online{romang:20130102:capstone:468051d, author = {Eric Romang}, title = {{Capstone Turbine Corporation Also Targeted in the CFR Watering Hole Attack And More}}, date = {2013-01-02}, url = {https://eromang.zataz.com/2013/01/02/capstone-turbine-corporation-also-targeted-in-the-cfr-watering-hole-attack-and-more/}, language = {English}, urldate = {2020-01-08} } Capstone Turbine Corporation Also Targeted in the CFR Watering Hole Attack And More
APT19
2013McAfeeRyan Sherstobitoff, Itai Liba, James Walter
@techreport{sherstobitoff:2013:dissecting:74f9183, author = {Ryan Sherstobitoff and Itai Liba and James Walter}, title = {{Dissecting Operation Troy: Cyberespionage in South Korea}}, date = {2013}, institution = {McAfee}, url = {https://paper.seebug.org/papers/APT/APT_CyberCriminal_Campagin/2013/dissecting-operation-troy.pdf}, language = {English}, urldate = {2020-01-08} } Dissecting Operation Troy: Cyberespionage in South Korea
httpdropper
2013FireEyeAlex Lanstein
@techreport{lanstein:2013:apts:2b30193, author = {Alex Lanstein}, title = {{APTs By The Dozen: Dissecting Advanced Attacks}}, date = {2013}, institution = {FireEye}, url = {https://web.archive.org/web/20130920120931/https:/www.rsaconference.com/writable/presentations/file_upload/cle-t04_final_v1.pdf}, language = {English}, urldate = {2020-08-14} } APTs By The Dozen: Dissecting Advanced Attacks
Korlia
2013NetSupport ManagerNetSupport Manager
@online{manager:2013:netsupport:f3fadef, author = {NetSupport Manager}, title = {{NetSupport Manager Website}}, date = {2013}, organization = {NetSupport Manager}, url = {http://www.netsupportmanager.com/index.asp}, language = {English}, urldate = {2020-01-07} } NetSupport Manager Website
NetSupportManager RAT
2013Trend MicroNart Villeneuve, Jessa dela Torre
@techreport{villeneuve:2013:fakem:672c581, author = {Nart Villeneuve and Jessa dela Torre}, title = {{FAKEM RAT}}, date = {2013}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/wp/wp-fakem-rat.pdf}, language = {English}, urldate = {2020-01-06} } FAKEM RAT
Terminator RAT
2013SymantecPiotr Krysiuk, Vikram Thakur
@techreport{krysiuk:2013:trojanbamital:1c4d921, author = {Piotr Krysiuk and Vikram Thakur}, title = {{Trojan.Bamital}}, date = {2013}, institution = {Symantec}, url = {https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/trojan-bamital-13-en.pdf}, language = {English}, urldate = {2019-12-24} } Trojan.Bamital
Bamital
2012-12-29Eric Romang BlogEric Romang
@online{romang:20121229:attack:2826780, author = {Eric Romang}, title = {{Attack and IE 0day Informations Used Against Council on Foreign Relations}}, date = {2012-12-29}, organization = {Eric Romang Blog}, url = {https://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/}, language = {English}, urldate = {2020-01-08} } Attack and IE 0day Informations Used Against Council on Foreign Relations
APT19
2012-12-27WikipediaVarious
@online{various:20121227:nitol:63a0ed5, author = {Various}, title = {{Nitol botnet}}, date = {2012-12-27}, organization = {Wikipedia}, url = {https://en.wikipedia.org/wiki/Nitol_botnet}, language = {English}, urldate = {2020-01-13} } Nitol botnet
Nitol
2012-12-26Contagio DumpMila Parkour
@online{parkour:20121226:zeroaccess:bf8d569, author = {Mila Parkour}, title = {{ZeroAccess / Sirefef Rootkit - 5 fresh samples}}, date = {2012-12-26}, organization = {Contagio Dump}, url = {http://contagiodump.blogspot.com/2012/12/zeroaccess-sirefef-rootkit-5-fresh.html}, language = {English}, urldate = {2019-12-20} } ZeroAccess / Sirefef Rootkit - 5 fresh samples
ZeroAccess
2012-12-24Contagio DumpMila Parkour
@online{parkour:20121224:dec:927ddb9, author = {Mila Parkour}, title = {{Dec 2012 Linux.Chapro - trojan Apache iframer}}, date = {2012-12-24}, organization = {Contagio Dump}, url = {http://contagiodump.blogspot.com/2012/12/dec-2012-linuxchapro-trojan-apache.html}, language = {English}, urldate = {2019-12-20} } Dec 2012 Linux.Chapro - trojan Apache iframer
Chapro Zeus
2012-12-24Contagiodump BlogMila Parkour
@online{parkour:20121224:dec:c19ac14, author = {Mila Parkour}, title = {{Dec. 2012 Trojan.Stabuniq samples - financial infostealer trojan}}, date = {2012-12-24}, organization = {Contagiodump Blog}, url = {http://contagiodump.blogspot.com/2012/12/dec-2012-trojanstabuniq-samples.html}, language = {English}, urldate = {2019-12-20} } Dec. 2012 Trojan.Stabuniq samples - financial infostealer trojan
Stabuniq
2012-12-23Contagio DumpMila Parkour
@online{parkour:20121223:dec:04b8065, author = {Mila Parkour}, title = {{Dec 2012 Dexter - POS Infostealer samples and information}}, date = {2012-12-23}, organization = {Contagio Dump}, url = {http://contagiodump.blogspot.com/2012/12/dexter-pos-infostealer-samples-and.html}, language = {English}, urldate = {2019-12-20} } Dec 2012 Dexter - POS Infostealer samples and information
Dexter
2012-12-21Trend MicroJason Pantig
@online{pantig:20121221:infostealer:775f6fa, author = {Jason Pantig}, title = {{Infostealer Dexter Targets Checkout Systems}}, date = {2012-12-21}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/infostealer-dexter-targets-checkout-systems/}, language = {English}, urldate = {2020-01-08} } Infostealer Dexter Targets Checkout Systems
Dexter
2012-12-20SymantecFred Gutierrez
@online{gutierrez:20121220:trojanstabuniq:3e7b380, author = {Fred Gutierrez}, title = {{Trojan.Stabuniq Found on Financial Institution Servers}}, date = {2012-12-20}, organization = {Symantec}, url = {https://www.symantec.com/connect/blogs/trojanstabuniq-found-financial-institution-servers}, language = {English}, urldate = {2020-01-10} } Trojan.Stabuniq Found on Financial Institution Servers
Stabuniq
2012-12-19ESET ResearchAleksandr Matrosov
@online{matrosov:20121219:win32spyranbyus:955d383, author = {Aleksandr Matrosov}, title = {{Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems}}, date = {2012-12-19}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2012/12/19/win32spy-ranbyus-modifying-java-code-in-rbs/}, language = {English}, urldate = {2019-11-14} } Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems
Ranbyus