Click here to download all references as Bib-File.•
2014-03-18
⋅
Windigo Linux Analysis – Ebury and Cdorked CDorked |
2014-03-18
⋅
ESET Research
⋅
Operation Windigo – the vivisection of a large Linux server‑side credential‑stealing malware campaign Boaxxe Glupteba |
2014-03-17
⋅
BAE Systems
⋅
Snake Campaign & Espionage Toolkit Agent.BTZ Uroburos |
2014-03-13
⋅
Threatpost
⋅
Energy Watering Hole Attack Used LightsOut Exploit Kit ENERGETIC BEAR |
2014-03-12
⋅
Blog (Artem Baranov)
⋅
Uroburos: the snake rootkit Uroburos |
2014-03-12
⋅
FireEye
⋅
A Detailed Examination of the Siesta Campaign APT1 Siesta |
2014-03-12
⋅
Kaspersky Labs
⋅
Agent.btz: a Source of Inspiration? Agent.BTZ |
2014-03-07
⋅
G Data
⋅
Uroburos – Deeper travel into kernel protection mitigation Uroburos |
2014-03-06
⋅
Threatpost
⋅
Dexter, Project Hook POS Malware Campaigns Persist Project Hook POS |
2014-03-06
⋅
Trend Micro
⋅
The Siesta Campaign: A New Targeted Attack Awakens APT1 |
2014-03-05
⋅
Symantec
⋅
Android RATs Branch out with Dendroid Dendroid |
2014-03-01
⋅
ESET Research
⋅
OPERATION WINDIGO Ebury |
2014-03-01
⋅
Vinsula
⋅
ChewBacca – A TOR Based POS Malware ChewBacca |
2014-02-28
⋅
G Data Blog
⋅
Uroburos - highly complex espionage software with Russian roots Uroburos |
2014-02-24
⋅
RSA Conference
⋅
The Art of Attribution Identifying and Pursuing your Cyber Adversaries ANDROMEDA SPIDER APT19 DEXTOROUS SPIDER Ghost Jackal Silent Chollima SINGING SPIDER Tonto Team TOXIC PANDA UNION SPIDER |
2014-02-23
⋅
Symantec
⋅
Trojan.Sakurel Sakula RAT |
2014-02-21
⋅
SonicWall
⋅
CVE 2014-0322 Malware - Sakurel (Feb 21, 2014) Sakula RAT |
2014-02-21
⋅
ESET Research
⋅
An In‑depth Analysis of Linux/Ebury Ebury |
2014-02-19
⋅
FireEye
⋅
XtremeRAT: Nuisance or Threat? Xtreme RAT |
2014-02-17
⋅
Malwarebytes
⋅
Hiding in plain sight: a story about a sneaky banking Trojan KINS VM Zeus |