Click here to download all references as Bib-File.•
2015-11-04
⋅
Check Point
⋅
“Offline” Ransomware Encrypts Your Data without C&C Communication Cryakl |
2015-11-04
⋅
Malwarebytes
⋅
A Technical Look At Dyreza Dyre |
2015-11-04
⋅
Avast
⋅
DroidJack isn’t the only spying software out there: Avast discovers OmniRat OmniRAT |
2015-11-03
⋅
Reversing the SMS C&C protocol of Emmental (1st part - understanding the code) Retefe |
2015-11-02
⋅
Virus Bulletin
⋅
Shifu – the rise of a self-destructive banking trojan Shifu |
2015-11-02
⋅
⋅
CyS Centrum
⋅
Modular trojan for hidden access to a computer LatentBot |
2015-11-02
⋅
Sophos
⋅
Troj/Cryakl-B Cryakl |
2015-11-01
⋅
FireEye
⋅
PINPOINTING TARGETS: Exploiting Web Analytics to Ensnare Victims witchcoven Turla |
2015-11-01
⋅
Check Point
⋅
ROCKET KIT TEN: A CAMPAIGN WITH 9 LIVES FireMalv MPKBot Woolger Cleaver Rocket Kitten |
2015-10-28
⋅
Reversing the C2C HTTP Emmental communication Retefe |
2015-10-26
⋅
Symantec
⋅
Duuzer back door Trojan targets South Korea to take over computers Brambul Duuzer Joanap Lazarus Group |
2015-10-26
⋅
Blueliv
⋅
Chasing cybercrime: network insights of Dyre and Dridex Trojan bankers Dridex Dyre |
2015-10-26
⋅
Symantec
⋅
Duuzer back door Trojan targets South Korea to take over computers Lazarus Group |
2015-10-22
⋅
Trend Micro
⋅
Pawn Storm Targets MH17 Investigation Team APT28 |
2015-10-19
⋅
Github (Anderson-D)
⋅
Github Repository for AllaKore AllaKore |
2015-10-17
⋅
BSK Consulting
⋅
How to Write Simple but Sound Yara Rules – Part 2 Enfal |
2015-10-16
⋅
Palo Alto Networks Unit 42
⋅
Surveillance Malware Trends: Tracking Predator Pain and HawkEye HawkEye Keylogger |
2015-10-15
⋅
BitSight
⋅
Dridex: Chasing a botnet from the inside Dridex |
2015-10-15
⋅
Archivist Archivist |
2015-10-13
⋅
Kaspersky Labs
⋅
I am HDRoot! Part 2 HDRoot |