Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-05-25ESET ResearchMichal Poslušný
BackSwap malware finds innovative ways to empty bank accounts
BackSwap
2018-04-16SalesforceVishal Thakur
Malware Analysis: New Trojan Double Dropper
Schneiken
2018-04-10Github (vithakur)Vishal Thakur
schneiken
Schneiken
2018-03-23Department of JusticeDepartment of Justice
Nine Iranians Charged With Conducting Massive Cyber Theft Campaign on Behalf of the Islamic Revolutionary Guard Corps
Silent Librarian
2018-03-23United States Department of JusticeUnited States Department of Justice
Nine Iranians Charged With Conducting Massive Cyber Theft Campaign on Behalf of the Islamic Revolutionary Guard Corps
Silent Librarian
2018-01-26ESET ResearchMichal Poslušný
FriedEx: BitPaymer ransomware the work of Dridex authors
Dridex FriedEx
2017-09-28ESET ResearchMichal Poslušný, Peter Kálnai
Money‑making machine: Monero‑mining malware
Monero Miner
2017-08-07Independent.ieCathal McMahon
'State-sponsored' hackers targeted EirGrid electricity network in 'devious attack'
ENERGETIC BEAR
2017-07-11Trend MicroMarshall Chen, Rubio Wu
Spam Campaign Delivers Cross-platform Remote Access Trojan Adwind
AdWind
2017-05-03Palo Alto Networks Unit 42Brandon Levene, Robert Falcone, Tyler Halfpop
Kazuar: Multiplatform Espionage Backdoor with API Access
Turla
2017-05-03Palo Alto Networks Unit 42Brandon Levene, Robert Falcone, Tyler Halfpop
Kazuar: Multiplatform Espionage Backdoor with API Access
Kazuar
2017-04-25ESET ResearchESET Research, Michal Malík
Linux Shishiga malware using LUA scripts
Shishiga
2017-03-27Twitter (@michalmalik)Michal Malík
Tweet on Linux IRC Bot
Xaynnalc
2016-12-20ESET ResearchMichal Malík, Peter Kálnai
New Linux/Rakos threat: devices and servers under SSH scan (again)
Rakos
2016-12-20ESET ResearchMichal Malík, Peter Kálnai
New Linux/Rakos threat: devices and servers under SSH scan (again)
2016-09-26Palo Alto Networks Unit 42Dani Creus, Robert Falcone, Tyler Halfpop
Sofacy’s ‘Komplex’ OS X Trojan
APT28
2016-09-26Palo Alto Networks Unit 42Dani Creus, Robert Falcone, Tyler Halfpop
Sofacy’s ‘Komplex’ OS X Trojan
Komplex
2016-05-04CylanceJim Walter
An Introduction to AlphaLocker
AlphaLocker
2015-12-21SymantecKevin Savage
Downloader.Ironhalo
IRONHALO
2015-12-08The CitizenlabClaudio Guarnieri, John Scott-Railton, Marion Marschalek, Morgan Marquis-Boire
Packrat: Seven Years of a South American Threat Actor
AdWind Adzok CyberGate Xtreme RAT Packrat
2015-04-18FireEyeChris Phillips, Corbin Souffrant, Dan Caselden, Darien Kin, Genwei Jiang, James “Tom” Bennett, Jonathan Wrolstad, Joshua Homan, Yasir Khalid
Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack
APT28
2015-02-18CyphortMarion Marschalek
Babar: Suspected Nation State Spyware In The Spotlight
Babar Evilbunny SNOWGLOBE
2015-02-18CyphortMarion Marschalek
Shooting Elephants
Babar
2014-12-16CyphortMarion Marschalek
EvilBunny: Malware Instrumented By Lua
Evilbunny SNOWGLOBE
2014-10-20PWCDan Kelly, Tom Lancaster
OrcaRAT - A whale of a tale
OrcaRAT
2012-12-12Volatility LabsMichael Hale Ligh
Unpacking Dexter POS "Memory Dump Parsing" Malware
Dexter
2009-03-17Marshal8e6Rodel Mendrez
Gheg spambot
Tofsee
2007-10-22Kaspersky LabsKaspersky Labs
Malware-Entwicklung im ersten Halbjahr 2007
HxDef