Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-04-09Dr.WebDr.Web
BackDoor.Gootkit.112—a new multi-purpose backdoor
GootKit
2014-04-02Virus BulletinRyan Mi
Tofsee botnet
Tofsee
2014-03-30IOC BucketIOC Bucket
IOC Bucket for Putter Panda
pngdowner
2014-03-25FireEyeAlex Lanstein, Ned Moran
Spear Phishing the News Cycle: APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370
APT30 Naikon
2014-03-18ESET ResearchPierre-Marc Bureau
Operation Windigo – the vivisection of a large Linux server‑side credential‑stealing malware campaign
Boaxxe Glupteba
2014-03-17BAE SystemsBAE Systems Applied Intelligence
Snake Campaign & Espionage Toolkit
Agent.BTZ Uroburos
2014-03-13Threatpost2014-03-13
Energy Watering Hole Attack Used LightsOut Exploit Kit
ENERGETIC BEAR
2014-03-12Blog (Artem Baranov)Andrzej Dereszowski, Matthieu Kaczmarek
Uroburos: the snake rootkit
Uroburos
2014-03-12FireEyeMike Oppenheim, Ned Moran
A Detailed Examination of the Siesta Campaign
APT1 Siesta
2014-03-12Kaspersky LabsAlexander Gostev
Agent.btz: a Source of Inspiration?
Agent.BTZ
2014-03-07G DataG Data
Uroburos – Deeper travel into kernel protection mitigation
Uroburos
2014-03-06ThreatpostChris Brook
Dexter, Project Hook POS Malware Campaigns Persist
Project Hook POS
2014-03-06Trend MicroMaharlito Aquino
The Siesta Campaign: A New Targeted Attack Awakens
APT1
2014-03-05SymantecMigration User
Android RATs Branch out with Dendroid
Dendroid
2014-03-01ESET ResearchAlexis Dorais-Joncas, Benjamin Vanheuverzwijn, Joan Calvet, Marc-Etienne M.Léveillé, Olivier Bilodeau, Pierre-Marc Bureau
OPERATION WINDIGO
Ebury
2014-03-01VinsulaIvo Ivanov
ChewBacca – A TOR Based POS Malware
ChewBacca
2014-02-28G Data BlogG Data
Uroburos - highly complex espionage software with Russian roots
Uroburos
2014-02-24RSA ConferenceDmitri Alperovitch
The Art of Attribution Identifying and Pursuing your Cyber Adversaries
ANDROMEDA SPIDER APT19 DEXTOROUS SPIDER Ghost Jackal Silent Chollima SINGING SPIDER Tonto Team TOXIC PANDA UNION SPIDER
2014-02-23SymantecSymantec
Trojan.Sakurel
Sakula RAT
2014-02-21ESET ResearchMarc-Etienne M.Léveillé
An In‑depth Analysis of Linux/Ebury
Ebury