Click here to download all references as Bib-File.•
2015-03-09
⋅
ESET Research
⋅
CryptoFortress mimics TorrentLocker but is a different ransomware CryptoFortress |
2015-03-07
⋅
CERT.PL
⋅
Slave, Banatrix and ransomware Slave |
2015-03-06
⋅
Kaspersky Labs
⋅
Animals in the APT Farm SNOWGLOBE |
2015-03-06
⋅
The DGA of DirCrypt DirCrypt |
2015-03-05
⋅
ESET Research
⋅
Casper Malware: After Babar and Bunny, Another Espionage Cartoon Casper |
2015-03-04
⋅
Twitter (@PhysicalDrive0)
⋅
Tweet on POS Malware pwnpos |
2015-03-04
⋅
Kaspersky Labs
⋅
Who’s Really Spreading through the Bright Star? Jaku |
2015-03-04
⋅
Malware Don't Need Coffee
⋅
New crypto ransomware in town : CryptoFortress |
2015-03-04
⋅
BriMor Labs
⋅
And you get a POS malware name...and you get a POS malware name....and you get a POS malware name.... pwnpos |
2015-03-03
⋅
Blaze's Security Blog
⋅
C99Shell not dead c99shell |
2015-03-03
⋅
Trend Micro
⋅
PwnPOS: Old Undetected PoS Malware Still Causing Havoc pwnpos |
2015-02-27
⋅
ThreatConnect
⋅
The Anthem Hack: All Roads Lead to China HttpBrowser |
2015-02-27
⋅
InfoSec Institute
⋅
ScanBox Framework scanbox |
2015-02-27
⋅
ThreatConnect
⋅
The Anthem Hack: All Roads Lead to China Derusbi |
2015-02-27
⋅
Virus Bulletin
⋅
VB2014 paper: The pluginer - Caphaw Shylock |
2015-02-25
⋅
Github (nyx0)
⋅
Pony Sourcecode Pony |
2015-02-25
⋅
Trend Micro
⋅
OPERATION ARID VIPER: Bypassing the Iron Dome AridViper |
2015-02-25
⋅
Github (nyx0)
⋅
KINS Banking Trojan Source Code KINS |
2015-02-24
⋅
Symantec
⋅
W32.Ramnit analysis Ramnit |
2015-02-23
⋅
CrowdStrike
⋅
Cyber Kung-Fu: The Great Firewall Art of DNS Poisoning |