Click here to download all references as Bib-File.•
2017-10-06
⋅
Blueliv
⋅
TrickBot banking trojan using EFLAGS as an anti-hook technique TrickBot |
2017-10-05
⋅
Virus Bulletin
⋅
Linking Xpaj and Nymaim Nymaim |
2017-10-05
⋅
Analysis of a malicious DOC used by Turla APT group; hunting persistence via PowerShell KopiLuwak |
2017-10-05
⋅
Virus Bulletin
⋅
Industroyer: Biggest threat to industrial control systems since Stuxnet Industroyer |
2017-10-05
⋅
Palo Alto Networks Unit 42
⋅
FreeMilk: A Highly Targeted Spear Phishing Campaign APT37 |
2017-10-05
⋅
FireEye
⋅
Significant FormBook Distribution Campaigns Impacting the U.S. and South Korea Formbook |
2017-10-05
⋅
Palo Alto Networks Unit 42
⋅
FreeMilk: A Highly Targeted Spear Phishing Campaign Freenki Loader PoohMilk Loader |
2017-10-05
⋅
Trend Micro
⋅
SYSCON Backdoor Uses FTP as a C&C Channel Syscon |
2017-10-04
⋅
Security 0wnage
⋅
Continued Activity targeting the Middle East POWERSTATS |
2017-10-04
⋅
CrowdStrike
⋅
Protecting the Software Supply Chain: Deep Insights into the CCleaner Backdoor CCleaner Backdoor |
2017-10-04
⋅
Twitter (@JohnLaTwC)
⋅
Tweet on Turla JS backdoor Maintools.js |
2017-10-03
⋅
Seqrite
⋅
Evolution of jRAT JAVA Malware AdWind |
2017-10-03
⋅
NetScout
⋅
The Flusihoc Dynasty, A Long Standing DDoS Botnet Flusihoc |
2017-10-02
⋅
Intezer
⋅
Evidence Aurora Operation Still Active Part 2: More Ties Uncovered Between CCleaner Hack & Chinese Hackers CCleaner Backdoor |
2017-10-01
⋅
Threat Fabric
⋅
LokiBot - The first hybrid Android malware LokiBot |
2017-09-29
⋅
CERT.PL
⋅
Ramnit – in-depth analysis Ramnit |
2017-09-28
⋅
Palo Alto Networks Unit 42
⋅
Threat Actors Target Government of Belarus Using CMSTAR Trojan BYEBY CMSTAR Vicious Panda |
2017-09-28
⋅
Palo Alto Networks Unit 42
⋅
Threat Actors Target Government of Belarus Using CMSTAR Trojan BYEBY CMSTAR |
2017-09-28
⋅
ESET Research
⋅
Money‑making machine: Monero‑mining malware Monero Miner |
2017-09-27
⋅
Proofpoint
⋅
Threat Actor Profile: TA505, From Dridex to GlobeImposter TA505 |