Click here to download all references as Bib-File.•
2014-04-09
⋅
Dr.Web
⋅
BackDoor.Gootkit.112—a new multi-purpose backdoor GootKit |
2014-04-02
⋅
Virus Bulletin
⋅
Tofsee botnet Tofsee |
2014-03-30
⋅
IOC Bucket
⋅
IOC Bucket for Putter Panda pngdowner |
2014-03-25
⋅
FireEye
⋅
Spear Phishing the News Cycle: APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370 APT30 Naikon |
2014-03-18
⋅
ESET Research
⋅
Operation Windigo – the vivisection of a large Linux server‑side credential‑stealing malware campaign Boaxxe Glupteba |
2014-03-17
⋅
BAE Systems
⋅
Snake Campaign & Espionage Toolkit Agent.BTZ Uroburos |
2014-03-13
⋅
Threatpost
⋅
Energy Watering Hole Attack Used LightsOut Exploit Kit ENERGETIC BEAR |
2014-03-12
⋅
Blog (Artem Baranov)
⋅
Uroburos: the snake rootkit Uroburos |
2014-03-12
⋅
FireEye
⋅
A Detailed Examination of the Siesta Campaign APT1 Siesta |
2014-03-12
⋅
Kaspersky Labs
⋅
Agent.btz: a Source of Inspiration? Agent.BTZ |
2014-03-07
⋅
G Data
⋅
Uroburos – Deeper travel into kernel protection mitigation Uroburos |
2014-03-06
⋅
Threatpost
⋅
Dexter, Project Hook POS Malware Campaigns Persist Project Hook POS |
2014-03-06
⋅
Trend Micro
⋅
The Siesta Campaign: A New Targeted Attack Awakens APT1 |
2014-03-05
⋅
Symantec
⋅
Android RATs Branch out with Dendroid Dendroid |
2014-03-01
⋅
ESET Research
⋅
OPERATION WINDIGO Ebury |
2014-03-01
⋅
Vinsula
⋅
ChewBacca – A TOR Based POS Malware ChewBacca |
2014-02-28
⋅
G Data Blog
⋅
Uroburos - highly complex espionage software with Russian roots Uroburos |
2014-02-24
⋅
RSA Conference
⋅
The Art of Attribution Identifying and Pursuing your Cyber Adversaries ANDROMEDA SPIDER APT19 DEXTOROUS SPIDER Ghost Jackal Silent Chollima SINGING SPIDER Tonto Team TOXIC PANDA UNION SPIDER |
2014-02-23
⋅
Symantec
⋅
Trojan.Sakurel Sakula RAT |
2014-02-21
⋅
ESET Research
⋅
An In‑depth Analysis of Linux/Ebury Ebury |