Click here to download all references as Bib-File.•
| 2011-01-03
            
            ⋅
            
            ESET Research
            ⋅
            
             Stuxnet Under the Microscope Stuxnet  | 
| 2011-01-01
            
            ⋅
            
            The Brown Journal of World Affairs
            ⋅
            
             The Spectrum of National Responsibility for Cyberattacks  | 
| 2011-01-01
            
            ⋅
            
            Symantec
            ⋅
            
             The Nitro Attacks: Stealing Secrets from the Chemical Industry Poison Ivy Nitro  | 
| 2011-01-01
            
            ⋅
            
            Symantec
            ⋅
            
             The Nitro Attacks Nitro  | 
| 2011-01-01
            
            ⋅
            
            Virus Bulletin
            ⋅
            
             A Survey of Contemporary Chinese DDoS Malware Rincux  | 
| 2011-01-01
            
            ⋅
            
            Spiegel Online
            ⋅
            
             SNOWGLOBE: From Discovery to Attribution Babar  | 
| 2010-12-27
            
            ⋅
            
            media.ccc.de
            ⋅
            
             Adventures in analyzing Stuxnet Stuxnet  | 
| 2010-12-20
            
            ⋅
            
            Kaspersky Labs
            ⋅
            
             End of the Line for the Bredolab Botnet? Bredolab  | 
| 2010-12-14
            
            ⋅
            
            FireEye
            ⋅
            
             Leouncia - Yet Another Backdoor - Part 2 Leouncia  | 
| 2010-12-14
            
            ⋅
            
            FireEye
            ⋅
            
             Leouncia - Yet Another Backdoor  | 
| 2010-11-20
            
            ⋅
            
            InfoSec Institute
            ⋅
            
             The Kernel-Mode Device Driver Stealth Rootkit ZeroAccess  | 
| 2010-11-16
            
            ⋅
            
             ZEROACCESS MALWARE - PART 3: The Device Driver Process Injection Rootkit ZeroAccess  | 
| 2010-11-15
            
            ⋅
            
            Infosec
            ⋅
            
             Tracing the Crimeware Origins by Reversing Injected Code ZeroAccess  | 
| 2010-11-10
            
            ⋅
            
            Zscaler
            ⋅
            
             Lethic Botnet Returns, Uses "Realtek" Identifier Lethic  | 
| 2010-11-01
            
            ⋅
            
            InfoSec Institute
            ⋅
            
             ZEROACCESS MALWARE - PART 1: De-Obfuscating and Reversing the User-Mode Agent Dropper ZeroAccess  | 
| 2010-10-27
            
            ⋅
            
            FireEye
            ⋅
            
             Bredolab - It's not the size of the dog in the fight.. Bredolab  | 
| 2010-10-25
            
            ⋅
            
            RSA
            ⋅
            
             Businesses Beware: Qakbot Spreads like a Worm, Stings like a Trojan QakBot  | 
| 2010-09-17
            
            ⋅
            
            KrebsOnSecurity
            ⋅
            
             SpyEye Botnet’s Bogus Billing Feature SpyEye  | 
| 2010-09-07
            
            ⋅
            
            S21sec
            ⋅
            
             ZeuS: The missing link Zeus  | 
| 2010-09-01
            
            ⋅
            
            VirusBulletin
            ⋅
            
             Injection as a way of life Virut  |