Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2013-06-03TrustwaveJosh Grunzweig
Alina: Following The Shadow Part 2
Alina POS
2013-06-01CrowdStrikeCrowdstrike Global intelliGenCe team
DEEP PANDA
APT19
2013-05-30CIRCLCIRCL
Analysis of a stage 3 Miniduke sample
MiniDuke
2013-05-29SymantecLionel Payet
South Korean Financial Companies Targeted by Castov
Lazarus Group
2013-05-29CIRCLCIRCL
Malware analysis report of a Backdoor.Snifula variant
Snifula
2013-05-28SymantecLionel Payet
South Korean Financial Companies Targeted by Castov
Lazarus Group
2013-05-22F-Secure LabsSean
Mac Spyware: OSX/KitM (Kumar in the Mac)
Kitmos
2013-05-21Malware Don't Need CoffeeKafeine
Unveiling the Locker Bomba (aka Lucky Locker v0.6 aka Lyposit/Adneukine)
Lyposit
2013-05-21Kleissner & AssociatesPeter Kleissner
News on MultiBanker, features now a jabber p2p functionality
Banjori
2013-05-20Trend MicroKyle Wilhoit, Nart Villeneuve
Safe - A Targeted Threat
SafeNet
2013-05-20AvastThreat Intelligence Team
Lockscreen Win32:Lyposit displayed as a fake MacOs app
Lyposit
2013-05-20FireEyeNed Moran
Ready for Summer: The Sunshop Campaign
9002 RAT
2013-05-17TrustwaveJosh Grunzweig
Alina: Following The Shadow Part 1
Alina POS
2013-05-08SpiderLabs BlogJosh Grunzweig
Alina: Casting a Shadow on POS
Alina POS
2013-05-03CrowdStrikeMatt Dahl
Department of Labor Strategic Web Compromise
APT19
2013-05-02ESET ResearchStephen Cobb
The stealthiness of Linux/Cdorked: a clarification
CDorked
2013-05-01Norman SharkJonathan Camp, Morten Kråkvik, Ned Moran, Snorre Fagerland
Operation Hangover
Smackdown
2013-05-01CiscoMary Landesman
Linux/CDorked FAQs
CDorked
2013-04-30SymantecJoseph Bingham, Kaoru Hayashi, Takayoshi Nakayama
Linux.Cdorked
CDorked
2013-04-26ESET ResearchPierre-Marc Bureau
Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole
CDorked