Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-11-29SophosLabs UncutAndrew Brandt
How a SamSam-like attack happens, and what you can do about it
SamSam
2018-11-01SophosLuca Nagy
Enter the Matrix (Ransomware)
Matrix Ransom
2018-10-22SophosLabs UncutTimothy Easton
Chalubo botnet wants to DDoS from your server or IoT device
Chalubo
2018-09-11Sophos Naked SecurityMark Stockley
The Rise of Targeted Ransomware
Dharma FriedEx SamSam
2018-08-02Sophos Naked SecurityMark Stockley
How to defend yourself against SamSam ransomware
SamSam
2018-08-01SophosLabsAndrew Brandt, Claire Mackenzie, Dorka Palotay, Hajnalka Kope, Luca Nagy, Mark Stockley, Peter Mackenzie, Simon Porter
SamSam: The (Almost) Six Million Dollar Ransomware
SamSam
2018-07-31Sophos Naked SecurityMark Stockley
SamSam: The (almost) $6 million ransomware
SamSam
2018-07-31SophosLabs UncutAndrew Brandt
SamSam guide to coverage
SamSam
2018-07-31SophosLabs UncutAndrew Brandt
Sophos releases SamSam ransomware report
SamSam
2018-07-29SophosFelix Weyne
AdKoob information thief targets Facebook ad purchase info
AdKoob
2018-05-01SophosSergei Shevchenko
VPNFilter Botnet - a SophosLabs Analysis
VPNFilter
2018-04-01SophosDorka Palotay, Peter Mackenzie
SamSam Ransomware Chooses Its Targets Carefully
SamSam
2018-01-31Sophos Naked SecurityPaul Ducklin
What are “WannaMine” attacks, and how do I avoid them?
WannaMine
2017-06-26SophosBill Brenner
How Spora ransomware tries to fool antivirus
Spora
2017-02-27SophosTed Heppner
Betabot: Configuration Data Extraction
BetaBot
2016-02-29SophosPaul Ducklin
The “HawkEye” attack: how cybercrooks target small businesses for big money
HawkEye Keylogger
2015-11-02SophosSophos
Troj/Cryakl-B
Cryakl
2014-06-27SophosLabsGabor Szappanos
PlugX - The Next Generation
PlugX
2014-01-21Sophos Naked SecurityPaul Ducklin
Digitally signed data-stealing malware targets Mac users in “undelivered courier item” attack
Laoshu
2013-08-01MalwarebytesJoshua Cannell
Sophos Discovers ZeroAccess Using RLO
ZeroAccess
2013-03-05Sophos Naked SecurityAnand Ajjan
Russian ransomware takes advantage of Windows PowerShell
FTCODE
2012-11-27SophosSophos
Threat Description: Troj/Ployx-A
ployx
2012-11-13SophosGraham Cluley
New variant of Mac Trojan discovered, targeting Tibet
iMuler
2012-08-30SophosSophos
Troj/Binanen-B
Binanen
2011-04-16SophosSophos
Troj/Sasfis-O
Sasfis
2010-07-24SophosJames Wyke
Why won’t my sample run?
Zeus
2009-04-01Sophos LabsMike Wood, Niall Fitzgibbon
Conficker.C A Technical Analysis