Click here to download all references as Bib-File.•
2018-05-23
⋅
Department of Justice
⋅
Justice Department Announces Actions to Disrupt Advanced Persistent Threat 28 Botnet of Infected Routers and Network Storage Devices VPNFilter APT28 |
2018-05-17
⋅
Fidelis
⋅
Gozi V3 Technical Update ISFB |
2018-04-18
⋅
Secureworks
⋅
GOLD GALLEON: How a Nigerian Cyber Crew Plunders the Shipping Industry Agent Tesla HawkEye Keylogger Pony GOLD GALLEON |
2018-03-30
⋅
⋅
360 Threat Intelligence
⋅
Analysis of the latest cyber attack activity of the APT organization against sensitive institutions in China Quasar RAT |
2018-03-25
⋅
Vitali Kremez Blog
⋅
Let's Learn: Internals of Iranian-Based Threat Group "Chafer" Malware: Autoit and PowerShell Persistence OilRig |
2018-03-13
⋅
FireEye
⋅
Iranian Threat Group Updates Tactics, Techniques and Procedures in Spear Phishing Campaign POWERSTATS MuddyWater |
2018-03-08
⋅
Avast
⋅
New investigations into the CCleaner incident point to a possible third stage that had keylogger capacities CCleaner Backdoor |
2018-03-02
⋅
eideon blog
⋅
Tales of a Threat Hunter 2 Following the trace of WMI Backdoors & other nastiness |
2018-03-01
⋅
Microsoft
⋅
FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines FinFisher RAT |
2018-02-27
⋅
ThreatVector
⋅
Threat Spotlight: Inside UDPoS Malware |
2018-02-27
⋅
VMWare Carbon Black
⋅
Threat Analysis: ROKRAT Malware RokRAT |
2018-02-21
⋅
Avast
⋅
Avast tracks down Tempting Cedar Spyware TemptingCedar Spyware |
2018-02-15
⋅
Secureworks
⋅
SamSam Ransomware Campaigns MimiKatz reGeorg SamSam BOSS SPIDER |
2018-02-15
⋅
Secureworks
⋅
SamSam: Converting Opportunity into Profit SamSam BOSS SPIDER |
2018-02-07
⋅
Cylance
⋅
Threat Spotlight: URSNIF Infostealer Malware ISFB |
2018-02-03
⋅
FireEye
⋅
Attacks Leveraging Adobe Zero-Day (CVE-2018-4878) – Threat Attribution, Attack Scenario and Recommendations TEMP.Hermit |
2018-01-16
⋅
Cylance
⋅
Threat Spotlight: LockPOS Point of Sale Malware LockPOS |
2018-01-04
⋅
Carnegie Endowment for International Peace
⋅
Iran’s Cyber Ecosystem: Who Are the Threat Actors? Magic Kitten |
2018-01-01
⋅
RiskIQ
⋅
Alphathreat Soup Burning Actors with Data |
2018-01-01
⋅
FireEye
⋅
The Forrester New Wave™: External Threat Intelligence Services, Q3 2018. APT1 |