Click here to download all references as Bib-File.•
2017-05-12
⋅
Github (chrisjd20)
⋅
powershell_web_backdoor powershell_web_backdoor |
2017-04-18
⋅
CyberScoop
⋅
Shadow Brokers leaks show U.S. spies successfully hacked Russian, Iranian targets The Shadow Brokers |
2017-03-23
⋅
FireEye
⋅
WMImplant – A WMI Based Agentless Post-Exploitation RAT Developed in PowerShell WMImplant |
2016-10-26
⋅
Unknown
⋅
Moonlight – Targeted attacks in the Middle East Houdini NjRAT Molerats |
2016-08-23
⋅
Threatpost
⋅
GozNym Banking Trojan Targeting German Banks GozNym |
2016-08-13
⋅
CrowdStrike
⋅
Detecting and Responding: Pandas and Bears FOXY PANDA POISONUS PANDA |
2016-04-25
⋅
Threat Post
⋅
Attackers Behind GozNym Trojan Set Sights on Europe GozNym |
2016-04-06
⋅
Proofpoint
⋅
Locky Ransomware Is Becoming More Sophisticated - Cybercriminals Continue Email Campaign Innovation Rockloader |
2016-01-01
⋅
CrowdStrike
⋅
Detecting and Responding: Pandas and Bears ELOQUENT PANDA UNION PANDA |
2015-09-16
⋅
Trend Micro
⋅
Operation Iron Tiger: Attackers Shift from East Asia to the United States APT27 |
2015-06-24
⋅
PWC
⋅
UnFIN4ished Business WOLF SPIDER |
2015-06-24
⋅
Spiceworks
⋅
Stealthy Cyberespionage Campaign Attacks With Social Engineering NanHaiShu |
2015-04-18
⋅
FireEye
⋅
Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack APT28 |
2015-03-30
⋅
Symantec
⋅
New reconnaissance threat Trojan.Laziok targets the energy sector Laziok |
2015-03-11
⋅
Zscaler
⋅
Malvertising Targeting European Transit Users Poweliks |
2014-12-18
⋅
The Washington Post
⋅
KeyPoint network breach could affect thousands of federal workers APT19 |
2014-10-27
⋅
PWC
⋅
ScanBox framework – who’s affected, and who’s using it? Jolob |
2014-08-28
⋅
Trend Micro
⋅
BIFROSE Now More Evasive Through Tor, Used for Targeted Attack bifrose |
2014-05-01
⋅
Recorded Future
⋅
Hunting Hidden Lynx: How OSINT is Crucial for APT Analysis APT17 |
2014-03-06
⋅
Threatpost
⋅
Dexter, Project Hook POS Malware Campaigns Persist Project Hook POS |
2013-10-01
⋅
MALWARE Conference
⋅
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus Gameover P2P |
2013-09-18
⋅
Zscaler
⋅
A New Wave Of WIN32/CAPHAW Attacks - A ThreatLabZ Analysis Shylock |
2012-07-25
⋅
Threatpost
⋅
New and Improved Madi Spyware Campaign Continues Madi |