Click here to download all references as Bib-File.•
2014-06-02
⋅
G Data
⋅
Analysis of Uroburos, using WinDbg Uroburos |
2014-06-02
⋅
FireEye
⋅
Molerats, Here for Spring! Molerats |
2014-05-30
⋅
Malwarebytes
⋅
Taking off the Blackshades BlackShades |
2014-05-29
⋅
The Washington Times
⋅
Iranian hackers sucker punch U.S. defense officials with creative social-media scam Charming Kitten |
2014-05-28
⋅
iSIGHT Partners (FireEye)
⋅
NEWSCASTER: An Iranian Threat Within Social Networks Charming Kitten |
2014-05-22
⋅
SecurityIntelligence
⋅
Meet the Zberp Trojan VM Zeus |
2014-05-19
⋅
The New York Times
⋅
5 in China Army Face U.S. Charges of Cyberattacks APT1 |
2014-05-16
⋅
Secureworks
⋅
APT Campaign Leverages the Cueisfry Trojan and Microsoft Word Vulnerability CVE-2014-1761 Cueisfry |
2014-05-15
⋅
Dr.Web
⋅
DDoS Trojans attack Linux MrBlack |
2014-05-13
⋅
CrowdStrike
⋅
Cat Scratch Fever: CrowdStrike Tracks Newly Reported Iranian Actor as FLYING KITTEN Flying Kitten |
2014-05-13
⋅
G Data
⋅
Uroburos rootkit: Belgian Foreign Ministry stricken Uroburos |
2014-05-06
⋅
MalwareTech
⋅
Rovnix new “evolution” Rovnix |
2014-05-05
⋅
VT Comments Page on Blue Banana Sample Blue Banana RAT |
2014-05-01
⋅
Recorded Future
⋅
Hunting Hidden Lynx: How OSINT is Crucial for APT Analysis APT17 |
2014-05-01
⋅
Arbor Networks
⋅
Into the Light of Day:Uncovering Ongoing and Historical Point of Sale Malware and Attack Campaigns poscardstealer |
2014-04-27
⋅
StopMalvertising
⋅
Analysis of the Predator Pain Keylogger HawkEye Keylogger |
2014-04-21
⋅
Wikipedia
⋅
Hacking Team Hacking Team |
2014-04-18
⋅
Trend Micro
⋅
TROJ64_WOWLIK.VT Alureon |
2014-04-17
⋅
Nettitude Labs
⋅
A quick analysis of the latest Shadow Brokers dump DarkPulsar |
2014-04-15
⋅
My infected computer
⋅
Trojan banking KrBanker |