Click here to download all references as Bib-File.•
2016-11-04
⋅
Antiy CERT
⋅
FROM EQUATION TO EQUATIONS DoubleFantasy |
2016-11-02
⋅
Ariel Koren's Blog
⋅
Nymaim Malware: Deep Technical Dive – Adventures in Evasive Malware Nymaim |
2016-11-02
⋅
GoSecure
⋅
Exposing the EGO MARKET: the cybercrime performed by the Linux/Moose botnet Moose |
2016-11-02
⋅
ESET Research
⋅
Linux/Moose: Still breathing Moose |
2016-11-01
⋅
Ariel Koren's Blog
⋅
Ursnif Malware: Deep Technical Dive ISFB |
2016-10-31
⋅
SC Magazine UK
⋅
Second Shadow Brokers dump released The Shadow Brokers |
2016-10-28
⋅
Github (smb01)
⋅
zxshell repository ZXShell |
2016-10-27
⋅
Sekoia
⋅
Rootkit analysisUse case on HideDRV HideDRV |
2016-10-27
⋅
Simon Roses Femerling Blog
⋅
Mirai DDoS Botnet: Source Code & Binary Analysis Mirai |
2016-10-27
⋅
Kaspersky Labs
⋅
Inside the Gootkit C&C server GootKit |
2016-10-27
⋅
Bleeping Computer
⋅
In-Dev Ransomware forces you do to Survey before unlocking Computer FileIce |
2016-10-27
⋅
Trend Micro
⋅
BLACKGEAR Espionage Campaign Evolves, Adds Japan To Target List Blackgear |
2016-10-27
⋅
Twitter (@struppigel)
⋅
Tweet on procleaner.exe ScreenLocker |
2016-10-26
⋅
Unknown
⋅
Moonlight – Targeted attacks in the Middle East Houdini NjRAT Molerats |
2016-10-25
⋅
NetScout
⋅
TrickBot Banker Insights Godzilla Loader TrickBot |
2016-10-25
⋅
Palo Alto Networks Unit 42
⋅
Houdini’s Magic Reappearance |
2016-10-25
⋅
Palo Alto Networks Unit 42
⋅
Houdini’s Magic Reappearance Houdini |
2016-10-24
⋅
Lastline
⋅
Evasive Malware Detects and Defeats Virtual Machine Analysis |
2016-10-24
⋅
Malwarebytes
⋅
Introducing TrickBot, Dyreza’s successor TrickBot |
2016-10-21
⋅
Forcepoint
⋅
BITTER: a targeted attack against Pakistan Bitter RAT |