Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-10-08ProofpointProofpoint Staff
@online{staff:20151008:dyre:7773d32, author = {Proofpoint Staff}, title = {{Dyre Malware Campaigners Innovate with Distribution Techniques}}, date = {2015-10-08}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/threat-insight/post/dyre-malware-campaigners-innovate-distribution-techniques}, language = {English}, urldate = {2020-03-04} } Dyre Malware Campaigners Innovate with Distribution Techniques
Gophe
2015-09-18ProofpointProofpoint Staff
@online{staff:20150918:operation:9af478b, author = {Proofpoint Staff}, title = {{Operation Arid Viper Slithers Back into View}}, date = {2015-09-18}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/threat-insight/post/Operation-Arid-Viper-Slithers-Back-Into-View}, language = {English}, urldate = {2019-12-20} } Operation Arid Viper Slithers Back into View
AridViper
2015-06-25ProofpointProofpoint Staff
@online{staff:20150625:sundown:53454bc, author = {Proofpoint Staff}, title = {{Sundown EK Spreads LuminosityLink RAT: Light After Dark}}, date = {2015-06-25}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/threat-insight/post/Light-After-Dark}, language = {English}, urldate = {2019-12-20} } Sundown EK Spreads LuminosityLink RAT: Light After Dark
Luminosity RAT