Click here to download all references as Bib-File.•
2015-11-19
⋅
JPCERT/CC
⋅
Decrypting Strings in Emdivi Emdivi |
2015-11-17
⋅
SpiderLabs Blog
⋅
New Memory Scraping Technique in Cherry Picker PoS Malware CherryPicker POS |
2015-11-16
⋅
Introducing LogPOS LogPOS |
2015-11-16
⋅
SpiderLabs Blog
⋅
Shining the Spotlight on Cherry Picker PoS Malware CherryPicker POS |
2015-11-11
⋅
ESET Research
⋅
Operation Buhtrap malware distributed via ammyy.com BuhTrap |
2015-11-11
⋅
Proofpoint
⋅
AbaddonPOS: A new point of sale threat linked to Vawtrak AbaddonPOS TinyLoader |
2015-11-10
⋅
Palo Alto Networks Unit 42
⋅
Bookworm Trojan: A Model of Modular Architecture Bookworm |
2015-11-10
⋅
CERT.PL
⋅
Talking to Dridex (part 0) – inside the dropper Dridex |
2015-11-06
⋅
SecurityIntelligence
⋅
OmniRAT Takes Over Android Devices Through Social Engineering Tricks OmniRAT |
2015-11-05
⋅
Kudelski Security
⋅
Sphinx Moth: Expanding our knowledge of the “Wild Neutron” / “Morpho” APT WildNeutron |
2015-11-04
⋅
Check Point
⋅
“Offline” Ransomware Encrypts Your Data without C&C Communication Cryakl |
2015-11-04
⋅
Malwarebytes
⋅
A Technical Look At Dyreza Dyre |
2015-11-04
⋅
Avast
⋅
DroidJack isn’t the only spying software out there: Avast discovers OmniRat OmniRAT |
2015-11-03
⋅
Reversing the SMS C&C protocol of Emmental (1st part - understanding the code) Retefe |
2015-11-02
⋅
Virus Bulletin
⋅
Shifu – the rise of a self-destructive banking trojan Shifu |
2015-11-02
⋅
⋅
CyS Centrum
⋅
Modular trojan for hidden access to a computer LatentBot |
2015-11-02
⋅
Sophos
⋅
Troj/Cryakl-B Cryakl |
2015-11-01
⋅
FireEye
⋅
PINPOINTING TARGETS: Exploiting Web Analytics to Ensnare Victims witchcoven Turla |
2015-11-01
⋅
Check Point
⋅
ROCKET KIT TEN: A CAMPAIGN WITH 9 LIVES FireMalv MPKBot Woolger Cleaver Rocket Kitten |
2015-10-28
⋅
Reversing the C2C HTTP Emmental communication Retefe |