Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-02-29SophosPaul Ducklin
@online{ducklin:20160229:hawkeye:e5bd59b, author = {Paul Ducklin}, title = {{The “HawkEye” attack: how cybercrooks target small businesses for big money}}, date = {2016-02-29}, organization = {Sophos}, url = {https://nakedsecurity.sophos.com/2016/02/29/the-hawkeye-attack-how-cybercrooks-target-small-businesses-for-big-money/}, language = {English}, urldate = {2019-11-27} } The “HawkEye” attack: how cybercrooks target small businesses for big money
HawkEye Keylogger
2015-11-02SophosSophos
@online{sophos:20151102:trojcryaklb:09148f2, author = {Sophos}, title = {{Troj/Cryakl-B}}, date = {2015-11-02}, organization = {Sophos}, url = {https://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~Cryakl-B/detailed-analysis.aspx}, language = {English}, urldate = {2019-11-28} } Troj/Cryakl-B
Cryakl
2014-06-27SophosLabsGabor Szappanos
@techreport{szappanos:20140627:plugx:e63d8bf, author = {Gabor Szappanos}, title = {{PlugX - The Next Generation}}, date = {2014-06-27}, institution = {SophosLabs}, url = {https://www.sophos.com/en-us/medialibrary/pdfs/technical%20papers/plugx-thenextgeneration.pdf}, language = {English}, urldate = {2020-01-10} } PlugX - The Next Generation
PlugX
2014-01-21Sophos Naked SecurityPaul Ducklin
@online{ducklin:20140121:digitally:4a7a4ee, author = {Paul Ducklin}, title = {{Digitally signed data-stealing malware targets Mac users in “undelivered courier item” attack}}, date = {2014-01-21}, organization = {Sophos Naked Security}, url = {https://nakedsecurity.sophos.com/2014/01/21/data-stealing-malware-targets-mac-users-in-undelivered-courier-item-attack/}, language = {English}, urldate = {2020-01-09} } Digitally signed data-stealing malware targets Mac users in “undelivered courier item” attack
Laoshu
2013-08-01MalwarebytesJoshua Cannell
@online{cannell:20130801:sophos:404c6a5, author = {Joshua Cannell}, title = {{Sophos Discovers ZeroAccess Using RLO}}, date = {2013-08-01}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2013/08/sophos-discovers-zeroaccess-using-rlo/}, language = {English}, urldate = {2019-12-20} } Sophos Discovers ZeroAccess Using RLO
ZeroAccess
2013-03-05Sophos Naked SecurityAnand Ajjan
@online{ajjan:20130305:russian:4bb6a48, author = {Anand Ajjan}, title = {{Russian ransomware takes advantage of Windows PowerShell}}, date = {2013-03-05}, organization = {Sophos Naked Security}, url = {https://nakedsecurity.sophos.com/2013/03/05/russian-ransomware-windows-powershell/}, language = {English}, urldate = {2020-01-27} } Russian ransomware takes advantage of Windows PowerShell
FTCODE
2012-11-27SophosSophos
@online{sophos:20121127:threat:b3f53e7, author = {Sophos}, title = {{Threat Description: Troj/Ployx-A}}, date = {2012-11-27}, organization = {Sophos}, url = {https://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~Ployx-A/detailed-analysis.aspx}, language = {English}, urldate = {2020-01-13} } Threat Description: Troj/Ployx-A
ployx
2012-11-13SophosGraham Cluley
@online{cluley:20121113:new:627d122, author = {Graham Cluley}, title = {{New variant of Mac Trojan discovered, targeting Tibet}}, date = {2012-11-13}, organization = {Sophos}, url = {https://nakedsecurity.sophos.com/2012/11/13/new-mac-trojan/}, language = {English}, urldate = {2020-01-08} } New variant of Mac Trojan discovered, targeting Tibet
iMuler
2012-08-30SophosSophos
@online{sophos:20120830:trojbinanenb:45d0249, author = {Sophos}, title = {{Troj/Binanen-B}}, date = {2012-08-30}, organization = {Sophos}, url = {https://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~Binanen-B/detailed-analysis.aspx}, language = {English}, urldate = {2020-01-26} } Troj/Binanen-B
Binanen
2011-04-16SophosSophos
@online{sophos:20110416:trojsasfiso:ffee6ab, author = {Sophos}, title = {{Troj/Sasfis-O}}, date = {2011-04-16}, organization = {Sophos}, url = {https://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~Sasfis-O/detailed-analysis.aspx}, language = {English}, urldate = {2019-12-19} } Troj/Sasfis-O
Sasfis
2010-07-24SophosJames Wyke
@online{wyke:20100724:why:17e044c, author = {James Wyke}, title = {{Why won’t my sample run?}}, date = {2010-07-24}, organization = {Sophos}, url = {https://nakedsecurity.sophos.com/2010/07/24/sample-run/}, language = {English}, urldate = {2020-01-13} } Why won’t my sample run?
Zeus
2009-04-01Sophos LabsNiall Fitzgibbon, Mike Wood
@techreport{fitzgibbon:20090401:confickerc:bb043d2, author = {Niall Fitzgibbon and Mike Wood}, title = {{Conficker.C A Technical Analysis}}, date = {2009-04-01}, institution = {Sophos Labs}, url = {https://www.sophos.com/fr-fr/medialibrary/PDFs/marketing%20material/confickeranalysis.pdf}, language = {English}, urldate = {2019-12-17} } Conficker.C A Technical Analysis