Click here to download all references as Bib-File.•
2016-09-26
⋅
Palo Alto Networks Unit 42
⋅
Sofacy’s ‘Komplex’ OS X Trojan Komplex |
2016-05-04
⋅
Cylance
⋅
An Introduction to AlphaLocker AlphaLocker |
2015-12-21
⋅
Symantec
⋅
Downloader.Ironhalo IRONHALO |
2015-12-08
⋅
The Citizenlab
⋅
Packrat: Seven Years of a South American Threat Actor AdWind Adzok CyberGate Xtreme RAT Packrat |
2015-04-18
⋅
FireEye
⋅
Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack APT28 |
2015-02-18
⋅
Cyphort
⋅
Babar: Suspected Nation State Spyware In The Spotlight Babar Evilbunny SNOWGLOBE |
2015-02-18
⋅
Cyphort
⋅
Shooting Elephants Babar |
2014-12-16
⋅
Cyphort
⋅
EvilBunny: Malware Instrumented By Lua Evilbunny SNOWGLOBE |
2014-10-20
⋅
PWC
⋅
OrcaRAT - A whale of a tale OrcaRAT |
2012-12-12
⋅
Volatility Labs
⋅
Unpacking Dexter POS "Memory Dump Parsing" Malware Dexter |
2009-03-17
⋅
Marshal8e6
⋅
Gheg spambot Tofsee |
2007-10-22
⋅
⋅
Kaspersky Labs
⋅
Malware-Entwicklung im ersten Halbjahr 2007 HxDef |