Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-11-14Digital GuardianChris Brook
IceID Banking Trojan Targeting Banks, Payment Card Providers, E-Commerce Sites
IcedID
2017-10-26FireEyeBarry Vengerik, Ben Read, Brian Mordosky, Christopher Glyer, Ian Ahl, Matt Williams, Michael Matonis, Nick Carr
BACKSWING - Pulling a BADRABBIT Out of a Hat
EternalPetya
2017-06-12SlideShareChristopher Doman
Open Source Malware - Sharing is caring?
HiddenTear
2017-06-05Christophe Tafani-Dereeper
Set up your own malware analysis lab with VirtualBox, INetSim and Burp
TeslaCrypt
2017-05-12Github (chrisjd20)chrisjd20
powershell_web_backdoor
powershell_web_backdoor
2017-04-18CyberScoopChris Bing
Shadow Brokers leaks show U.S. spies successfully hacked Russian, Iranian targets
The Shadow Brokers
2017-03-23FireEyeChristopher Truncer
WMImplant – A WMI Based Agentless Post-Exploitation RAT Developed in PowerShell
WMImplant
2016-10-26UnknownChris Doman
Moonlight – Targeted attacks in the Middle East
Houdini NjRAT Molerats
2016-08-23ThreatpostChris Brook
GozNym Banking Trojan Targeting German Banks
GozNym
2016-08-13CrowdStrikeChris Scott, Wendi Whitmore
Detecting and Responding: Pandas and Bears
FOXY PANDA POISONUS PANDA
2016-04-25Threat PostChris Brook
Attackers Behind GozNym Trojan Set Sights on Europe
GozNym
2016-04-06ProofpointChris Wakelin
Locky Ransomware Is Becoming More Sophisticated - Cybercriminals Continue Email Campaign Innovation
Rockloader
2016-01-01CrowdStrikeChristopher Scott, Wendi Whitmore
Detecting and Responding: Pandas and Bears
ELOQUENT PANDA UNION PANDA
2015-09-16Trend MicroChristopher Budd
Operation Iron Tiger: Attackers Shift from East Asia to the United States
APT27
2015-06-24PWCChris Doman, Michael Yip
UnFIN4ished Business
WOLF SPIDER
2015-06-24SpiceworksChris Miller
Stealthy Cyberespionage Campaign Attacks With Social Engineering
NanHaiShu
2015-04-18FireEyeChris Phillips, Corbin Souffrant, Dan Caselden, Darien Kin, Genwei Jiang, James “Tom” Bennett, Jonathan Wrolstad, Joshua Homan, Yasir Khalid
Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack
APT28
2015-03-30SymantecChristian Tripputi
New reconnaissance threat Trojan.Laziok targets the energy sector
Laziok
2015-03-11ZscalerChris Mannon
Malvertising Targeting European Transit Users
Poweliks
2014-12-18The Washington PostChristian Davenport
KeyPoint network breach could affect thousands of federal workers
APT19
2014-10-27PWCChris Doman, Tom Lancaster
ScanBox framework – who’s affected, and who’s using it?
Jolob
2014-08-28Trend MicroChristopher Daniel So
BIFROSE Now More Evasive Through Tor, Used for Targeted Attack
bifrose
2014-05-01Recorded FutureChris
Hunting Hidden Lynx: How OSINT is Crucial for APT Analysis
APT17
2014-03-06ThreatpostChris Brook
Dexter, Project Hook POS Malware Campaigns Persist
Project Hook POS
2013-10-01MALWARE ConferenceBrett Stone-Gross, Christian Rossow, Daniel Plohmann, Dennis Andriesse, Herbert Bos
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus
Gameover P2P
2013-09-18ZscalerChris Mannon, Sachin Deodhar
A New Wave Of WIN32/CAPHAW Attacks - A ThreatLabZ Analysis
Shylock
2012-07-25ThreatpostChris Brook
New and Improved Madi Spyware Campaign Continues
Madi