Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-12-01Trend MicroErika Mendoza, Jay Yaneza
Operation Black Atlas Endangers In-Store Card Payments and SMBs Worldwide; Switches between BlackPOS and Other Tools
Alina POS BlackPOS Kronos NewPosThings
2015-12-01CERT.PLCERT.PL
ZeuS-P2P monitoring and analysis
Gameover P2P
2015-12-01FireEyeFireEye Threat Intelligence
China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets
BUBBLEWRAP LOWBALL TEMPER PANDA
2015-11-300x3A SecurityYonathan Klijnsma
Inside Braviax/FakeRean: An analysis and history of a FakeAV family
2015-11-27Twitter (@PhysicalDrive0)PhysicalDrive0
Tweet on ModPOS
ModPOS
2015-11-25RSARSA
Detecting GlassRAT using Security Analytics and ECAT
GlassRAT
2015-11-24FireEyeStephen Ward
ModPOS: Highly-Sophisticated, Stealthy Malware Targeting US POS Systems with High Likelihood of Broader Campaigns
ModPOS
2015-11-23MinervaLabsClearSky, MinervaLabs
CopyKittens Attack Group
CopyKittens
2015-11-20Jos Wetzels
A king's ransom: an analysis of the CTB-locker ransomware
CTB Locker
2015-11-20MicrosoftMicrosoft
Microsoft Security Intelligence Report Volume 19
XTunnel
2015-11-19JPCERT/CCYou Nakatsuru
Decrypting Strings in Emdivi
Emdivi
2015-11-17SpiderLabs BlogEric Merritt
New Memory Scraping Technique in Cherry Picker PoS Malware
CherryPicker POS
2015-11-16Nick Hoffman
Introducing LogPOS
LogPOS
2015-11-16SpiderLabs BlogEric Merritt
Shining the Spotlight on Cherry Picker PoS Malware
CherryPicker POS
2015-11-11ESET ResearchJean-Ian Boutin
Operation Buhtrap malware distributed via ammyy.com
BuhTrap
2015-11-11ProofpointDarien Huss
AbaddonPOS: A new point of sale threat linked to Vawtrak
AbaddonPOS TinyLoader
2015-11-10Palo Alto Networks Unit 42Juan Cortes, Mike Scott, Robert Falcone
Bookworm Trojan: A Model of Modular Architecture
Bookworm
2015-11-10CERT.PLCERT.PL
Talking to Dridex (part 0) – inside the dropper
Dridex
2015-11-06SecurityIntelligenceShane Schick
OmniRAT Takes Over Android Devices Through Social Engineering Tricks
OmniRAT
2015-11-05Kudelski Securitykscert
Sphinx Moth: Expanding our knowledge of the “Wild Neutron” / “Morpho” APT
WildNeutron