Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-06-15Fox-ITFox IT
Mofang: A politically motivated information stealing adversary
Mofang
2016-05-17Fox-ITDanny Heppener, Erik de Jong, Krijn de Mik, Lennart Haagsma, Maarten van Dantzig, Martin van Hensbergen, Mitchel Sahertian, Yonathan Klijnsma, Yun Zheng Hu
Mofang: A politically motivated information stealing adversary
Shim RAT Mofang
2016-05-17Fox-ITDanny Heppener, Erik de Jong, Krijn de Mik, Lennart Haagsma, Maarten van Dantzig, Martin van Hensbergen, Mitchel Sahertian, Yonathan Klijnsma, Yun Zheng Hu
Mofang: A politically motivated information stealing adversary
Shim RAT Mofang
2016-05-17Fox-ITDanny Heppener, Erik de Jong, Krijn de Mik, Lennart Haagsma, Maarten van Dantzig, Martin van Hensbergen, Mitchel Sahertian, Yonathan Klijnsma, Yun Zheng Hu
Mofang: A politically motivated information stealing adversary
Shim RAT Mofang
2016-05-17Fox-ITDanny Heppener, Erik de Jong, Krijn de Mik, Lennart Haagsma, Maarten van Dantzig, Martin van Hensbergen, Mitchel Sahertian, Yonathan Klijnsma, Yun Zheng Hu
Mofang: A politically motivated information stealing adversary
Shim RAT Mofang
2016-05-17Fox-ITDanny Heppener, Erik de Jong, Krijn de Mik, Lennart Haagsma, Maarten van Dantzig, Martin van Hensbergen, Mitchel Sahertian, Yonathan Klijnsma, Yun Zheng Hu
Mofang: A politically motivated information stealing adversary
Shim RAT Mofang
2016-05-17Fox-ITDanny Heppener, Erik de Jong, Krijn de Mik, Lennart Haagsma, Maarten van Dantzig, Martin van Hensbergen, Mitchel Sahertian, Yonathan Klijnsma, Yun Zheng Hu
Mofang: A politically motivated information stealing adversary
Shim RAT Mofang
2016-05-17Fox-ITDanny Heppener, Erik de Jong, Krijn de Mik, Lennart Haagsma, Maarten van Dantzig, Martin van Hensbergen, Mitchel Sahertian, Yonathan Klijnsma, Yun Zheng Hu
Mofang: A politically motivated information stealing adversary
Shim RAT Mofang
2016-05-17Fox-ITDanny Heppener, Erik de Jong, Krijn de Mik, Lennart Haagsma, Maarten van Dantzig, Martin van Hensbergen, Mitchel Sahertian, Yonathan Klijnsma, Yun Zheng Hu
Mofang: A politically motivated information stealing adversary
Shim RAT Mofang
2016-05-17Fox-ITDanny Heppener, Erik de Jong, Krijn de Mik, Lennart Haagsma, Maarten van Dantzig, Martin van Hensbergen, Mitchel Sahertian, Yonathan Klijnsma, Yun Zheng Hu
Mofang: A politically motivated information stealing adversary
Shim RAT Mofang
2016-05-03William Showalter
A Universal Windows Bootkit
APT41
2016-03-30SecureworksCounter Threat Unit ResearchTeam
Ransomware Deployed by Adversary with Established Foothold
MimiKatz reGeorg SamSam BOSS SPIDER
2016-03-02RSA ConferenceVanja Svajcer
Dissecting Derusbi
Derusbi
2016-01-22RSA LinkNorton Santos
PlugX APT Malware
PlugX
2016-01-22RSANorton Santos
Sykipot APT Malware
sykipot
2015-11-25RSARSA
Detecting GlassRAT using Security Analytics and ECAT
GlassRAT
2014-09-22SecurityIntelligenceAssaf Regev, Tal Darsan
Tinba Malware Reloaded and Attacking Banks Around the World
Tinba
2014-08-27Kaspersky LabsKaspersky
NetTraveler Gets a Makeover for 10th Anniversary
APT21
2014-07-10Kaspersky LabsMikhail Kuzin
Versatile DDoS Trojan for Linux
BillGates
2014-02-24RSA ConferenceDmitri Alperovitch
The Art of Attribution Identifying and Pursuing your Cyber Adversaries
ANDROMEDA SPIDER APT19 DEXTOROUS SPIDER Ghost Jackal Silent Chollima SINGING SPIDER Tonto Team TOXIC PANDA UNION SPIDER
2014-01-01RSARSA Research
RSA Incident Response: Emerging Threat Profile Shell_Crew
Derusbi
2013-10-29RSA ConferenceJaromír Hořejší, Peter Kálnai
Dissecting Banking Trojan Carberp
Carberp
2013-10-29RSA ConferenceJaromír Hořejší, Peter Kálnai
Dissecting Banking Trojan Carberp
Carberp
2013-10-16CrowdStrikeAdam Meyers
CrowdCasts Monthly: You Have an Adversary Problem
ELECTRIC PANDA GIBBERISH PANDA TEST PANDA
2013-08-07RSALimor Kessem
Thieves Reaching for Linux—”Hand of Thief” Trojan Targets Linux #INTH3WILD
Hand of Thief
2013-07-30ESET Researchwelivesecurity
Versatile and infectious: Win64/Expiro is a cross‑platform file infector
Expiro
2013-06-26SymantecSymantec Security Response
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War
Lazarus Group
2013-06-26SymantecSecurity Response
Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War
Lazarus Group
2010-10-25RSARSA FraudAction Research Labs
Businesses Beware: Qakbot Spreads like a Worm, Stings like a Trojan
QakBot
2010-02-19MalwareIntelligenceJorge Mieres
SpyEye Bot (Part two). Conversations with the creator of crimeware
SpyEye