Click here to download all references as Bib-File.•
2013-09-01
⋅
Eternal Todo
⋅
Yet another Andromeda / Gamarue analysis Andromeda |
2013-08-27
⋅
Avast
⋅
Linux Trojan “Hand of Thief” ungloved Hand of Thief |
2013-08-25
⋅
AusCERT
⋅
The Compromised Devices of the Carna Botnet |
2013-08-23
⋅
FireEye
⋅
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy Poison Ivy Molerats |
2013-08-14
⋅
VirusTotal
⋅
VT Report for a sample GSpy |
2013-08-13
⋅
KrebsOnSecurity
⋅
Inside a ‘Reveton’ Ransomware Operation Reveton |
2013-08-13
⋅
MalwareTech
⋅
PowerLoader Injection – Something truly amazing PowerLoader |
2013-08-12
⋅
FireEye
⋅
Survival of the Fittest: New York Times Attackers Evolve Quickly yayih |
2013-08-12
⋅
ContagioExchange
⋅
Taleret strings - APT (1) Taleret |
2013-08-07
⋅
RSA
⋅
Thieves Reaching for Linux—”Hand of Thief” Trojan Targets Linux #INTH3WILD Hand of Thief |
2013-08-07
⋅
FireEye
⋅
Breaking Down the China Chopper Web Shell - Part I CHINACHOPPER |
2013-08-02
⋅
CitizenLab
⋅
Surtr Malware Family Targeting the Tibetan Community surtr |
2013-08-01
⋅
Virus Bulletin
⋅
Andromeda 2.7 features Andromeda |
2013-08-01
⋅
Malwarebytes
⋅
Sophos Discovers ZeroAccess Using RLO ZeroAccess |
2013-07-31
⋅
Secureworks
⋅
Secrets of the Comfoo Masters Comfoo |
2013-07-30
⋅
ESET Research
⋅
Versatile and infectious: Win64/Expiro is a cross‑platform file infector Expiro |
2013-07-25
⋅
Malwarebytes
⋅
ZeroAccess uses Self-Debugging ZeroAccess |
2013-07-22
⋅
Avast
⋅
Multisystem Trojan Janicab attacks Windows and MacOSX via scripts Janicab |
2013-07-19
⋅
BlackHat
⋅
End-to-End Analysis of a Domain Generating Algorithm Malware Family SuppoBox |
2013-07-15
⋅
F-Secure
⋅
Signed Mac Malware Using Right-to-Left Override Trick Janicab |