Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-08-10Coding StuffsSergio Paganoni
Fobber Code Decryption
Fobber
2015-08-10shadowserverBen Koehl, Ned Moran
The Italian Connection: An analysis of exploit supply chains and digital quartermasters
smac APT20
2015-08-10Palo Alto Networks Unit 42Ryan Olson
What’s Next in Malware After Kuluoz?
Asprox
2015-08-10Kaspersky LabsGReAT
Darkhotel’s attacks in 2015
DarkHotel DarkHotel
2015-08-06SymantecJon DiMaggio
The Black Vine cyberespionage group
Sakula RAT APT19
2015-08-06CrowdStrikeAdam Kozy, Johannes Gilger
Bringing A Cannon To A Knife Fight
2015-08-06SymantecJon DiMaggio
The Black Vine cyberespionage group
2015-08-05SecureworksCTU Research Team
Threat Group 3390 Cyberespionage
APT27
2015-08-05SecureworksCTU Research Team
Threat Group 3390 Cyberespionage
2015-08-05Ars TechnicaSean Gallagher
Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes”
APT27
2015-08-05Black HatElliott Peterson, Michael Sandee, Tillmann Werner
Gameover Zeus – Bad Guys and Backends
Gameover P2P
2015-08-05MalwarebytesMalwarebytes Labs
Who’s Behind Your Proxy? Uncovering Bunitu’s Secrets
Bunitu
2015-08-01Arbor NetworksASERT Team
Uncovering the Seven Pointed Dagger
9002 RAT EvilGrab PlugX Trochilus RAT APT9
2015-08-01root9broot9b
TECHNICAL FOLLOW UP - APT28
XTunnel
2015-07-31AlienVault OTXKMEROLLA
OTX: FBI Flash #68 (PlugX)
APT9
2015-07-31AlienVaultKMEROLLA
OTX Pulse on PlugX
2015-07-30ESET ResearchAnton Cherepanov, Robert Lipovsky
Operation Potao Express: Analysis of a cyber‑espionage toolkit
FakeTC
2015-07-30SecureworksDell Secureworks CTU
Sakula Malware Family
Sakula RAT
2015-07-30ESET ResearchAnton Cherepanov, Robert Lipovsky
Operation Potao Express: Analysis of a cyber‑espionage toolkit
FakeTC
2015-07-29Youtube (FireEye Inc.)FireEye
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group
tDiscoverer