Click here to download all references as Bib-File.•
2015-04-09
⋅
ESET Research
⋅
Operation Buhtrap, the trap for Russian accountants Buhtrap BuhTrap |
2015-04-06
⋅
Novetta
⋅
WINNTI ANALYSIS Winnti |
2015-04-01
⋅
FireEye
⋅
APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION BACKBEND backspace CREAMSICLE FLASHFLOOD GEMCUTTER MILKMAID Naikon NETEAGLE ORANGEADE SHIPSHAPE SPACESHIP SslMM Sys10 WinMM xsPlus APT30 |
2015-04-01
⋅
Trend Micro
⋅
NewPosThings Has New PoS Things NewPosThings |
2015-03-31
⋅
Check Point Research
⋅
Volatile Cedar - Analysis of a Global Cyber Espionage Campaign Volatile Cedar |
2015-03-31
⋅
Kaspersky Labs
⋅
Sinkholing Volatile Cedar DGA Infrastructure Volatile Cedar |
2015-03-30
⋅
Check Point
⋅
Volatile Cedar Volatile Cedar |
2015-03-30
⋅
Symantec
⋅
New reconnaissance threat Trojan.Laziok targets the energy sector Laziok |
2015-03-30
⋅
Trend Micro
⋅
Fake Judicial Spam Leads to Backdoor with Fake Certificate Authority GootKit |
2015-03-28
⋅
Github (hfiref0x)
⋅
UACME UACMe |
2015-03-24
⋅
Trend Micro
⋅
Operation Woolen-Goldfish: When Kittens Go Phishing Ghole Woolger |
2015-03-20
⋅
Cisco Talos
⋅
Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware FindPOS |
2015-03-19
⋅
Trend Micro
⋅
Operation WOOLEN-GOLDFISH: When Kittens Go Phishing Ghole Woolger |
2015-03-19
⋅
Analyzing a Backdoor/Bot forthe MIPS Platform TheMoon |
2015-03-19
⋅
Trend Micro
⋅
Rocket Kitten Showing Its Claws: Operation Woolen-GoldFish and the GHOLE campaign Cleaver Rocket Kitten |
2015-03-19
⋅
Palo Alto Networks Unit 42
⋅
FindPOS: New POS Malware Family Discovered FindPOS |
2015-03-18
⋅
Seattle Times
⋅
Feds warned Premera about security flaws before breach APT19 |
2015-03-11
⋅
Kaspersky Labs
⋅
Inside the EquationDrug Espionage Platform EquationDrug |
2015-03-11
⋅
Zscaler
⋅
Malvertising Targeting European Transit Users Poweliks |
2015-03-10
⋅
Johannes Bader Blog
⋅
The DGA of Pykspa Pykspa |