Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2011-03-02ESET ResearchDavid Harley
TDL4 and Glupteba: Piggyback PiggyBugs
Glupteba
2011-02-24Contagiodump BlogMila Parkour
ZeroAccess / Max++ / Smiscer Crimeware Rootkit sample for Step-by-Step Reverse Engineering by Giuseppe Bonfa - << (Update 2011 version available)
ZeroAccess
2011-02-10McAfeeMcAfee Foundstone Professional Services, McAfee Labs
Global Energy Cyberattacks: “Night Dragon”
Night Dragon
2011-01-30Steven K
GpCode Ransomware 2010 Simple Analysis
GPCode
2011-01-20antivirnews
Beschreibung des Virus Backdoor.Win32. Buterat.afj
Buterat
2011-01-09Contagio DumpMila Parkour
Jan 6 CVE-2010-3333 DOC with info theft trojan from the American Chamber of Commerce
playwork
2011-01-03ESET ResearchAleksandr Matrosov, David Harley, Eugene Rodionov, Juraj Malcho
Stuxnet Under the Microscope
Stuxnet
2011-01-01The Brown Journal of World AffairsJason Healey
The Spectrum of National Responsibility for Cyberattacks
2011-01-01SymantecErica Eng, Gavin O'Gorman
The Nitro Attacks: Stealing Secrets from the Chemical Industry
Poison Ivy Nitro
2011-01-01SymantecEric Chien, Gavin O'Gorman
The Nitro Attacks
Nitro
2011-01-01Virus BulletinJeff Edwards, Jose Nazario
A Survey of Contemporary Chinese DDoS Malware
Rincux
2011-01-01Spiegel OnlineCSE Canada
SNOWGLOBE: From Discovery to Attribution
Babar
2010-12-27media.ccc.deBruce Dang, Peter Ferrie
Adventures in analyzing Stuxnet
Stuxnet
2010-12-20Kaspersky LabsAlexei Kadiev
End of the Line for the Bredolab Botnet?
Bredolab
2010-12-14FireEyeAtif Mushtaq
Leouncia - Yet Another Backdoor - Part 2
Leouncia
2010-12-14FireEyeAtif Mushtaq
Leouncia - Yet Another Backdoor
2010-11-20InfoSec InstituteGiuseppe Bonfa
The Kernel-Mode Device Driver Stealth Rootkit
ZeroAccess
2010-11-16Giuseppe Bonfa
ZEROACCESS MALWARE - PART 3: The Device Driver Process Injection Rootkit
ZeroAccess
2010-11-15InfosecGiuseppe Bonfa
Tracing the Crimeware Origins by Reversing Injected Code
ZeroAccess
2010-11-01InfoSec InstituteGiuseppe Bonfa
ZEROACCESS MALWARE - PART 1: De-Obfuscating and Reversing the User-Mode Agent Dropper
ZeroAccess