Click here to download all references as Bib-File.•
| 2015-11-17
⋅
SpiderLabs Blog
⋅
New Memory Scraping Technique in Cherry Picker PoS Malware CherryPicker POS |
| 2015-11-16
⋅
Introducing LogPOS LogPOS |
| 2015-11-16
⋅
SpiderLabs Blog
⋅
Shining the Spotlight on Cherry Picker PoS Malware CherryPicker POS |
| 2015-11-11
⋅
ESET Research
⋅
Operation Buhtrap malware distributed via ammyy.com BuhTrap |
| 2015-11-11
⋅
Proofpoint
⋅
AbaddonPOS: A new point of sale threat linked to Vawtrak AbaddonPOS TinyLoader |
| 2015-11-10
⋅
Palo Alto Networks Unit 42
⋅
Bookworm Trojan: A Model of Modular Architecture Bookworm |
| 2015-11-10
⋅
CERT.PL
⋅
Talking to Dridex (part 0) – inside the dropper Dridex |
| 2015-11-06
⋅
SecurityIntelligence
⋅
OmniRAT Takes Over Android Devices Through Social Engineering Tricks OmniRAT |
| 2015-11-05
⋅
Kudelski Security
⋅
Sphinx Moth: Expanding our knowledge of the “Wild Neutron” / “Morpho” APT WildNeutron |
| 2015-11-04
⋅
Check Point
⋅
“Offline” Ransomware Encrypts Your Data without C&C Communication Cryakl |
| 2015-11-04
⋅
Malwarebytes
⋅
A Technical Look At Dyreza Dyre |
| 2015-11-04
⋅
Avast
⋅
DroidJack isn’t the only spying software out there: Avast discovers OmniRat OmniRAT |
| 2015-11-03
⋅
Reversing the SMS C&C protocol of Emmental (1st part - understanding the code) Retefe |
| 2015-11-02
⋅
Virus Bulletin
⋅
Shifu – the rise of a self-destructive banking trojan Shifu |
| 2015-11-02
⋅
⋅
CyS Centrum
⋅
Modular trojan for hidden access to a computer LatentBot |
| 2015-11-02
⋅
Sophos
⋅
Troj/Cryakl-B Cryakl |
| 2015-11-01
⋅
FireEye
⋅
PINPOINTING TARGETS: Exploiting Web Analytics to Ensnare Victims witchcoven Turla |
| 2015-11-01
⋅
Check Point
⋅
ROCKET KIT TEN: A CAMPAIGN WITH 9 LIVES FireMalv MPKBot Woolger Cleaver Rocket Kitten |
| 2015-10-28
⋅
Reversing the C2C HTTP Emmental communication Retefe |
| 2015-10-26
⋅
Symantec
⋅
Duuzer back door Trojan targets South Korea to take over computers Brambul Duuzer Joanap Lazarus Group |