Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-08-05SecureworksCTU Research Team
Threat Group 3390 Cyberespionage
APT27
2015-08-05SecureworksCTU Research Team
Threat Group 3390 Cyberespionage
2015-07-30SecureworksDell Secureworks CTU
Sakula Malware Family
Sakula RAT
2015-06-15SecureworksCTU Research Team
Stegoloader: A Stealthy Information Stealer
StegoLoader
2014-12-17SecureworksBrett Stone-Gross, Pallav Khandhar
Dyre Banking Trojan
Dyre Vawtrak WIZARD SPIDER
2014-08-07SecureworksBrett Stone-Gross
Malware Analysis of the Lurk Downloader
Lurk
2014-05-16SecureworksParam Singh
APT Campaign Leverages the Cueisfry Trojan and Microsoft Word Vulnerability CVE-2014-1761
Cueisfry
2014-02-14SecureworksCounter Threat Unit ResearchTeam
Analysis of DHS NCCIC Indicators
jspRAT BeepService DDKeylogger LinseningSvr ONHAT SimpleFileMover ZiyangRAT
2013-12-18SecureworksKeith Jarvis
CryptoLocker Ransomware
CryptoLocker
2013-07-31SecureworksJoe Stewart
Secrets of the Comfoo Masters
Comfoo
2011-08-03SecureworksJoe Stewart
HTran and the Advanced Persistent Threat
HTran
2010-03-10SecureworksDon Jackson, Kevin Stevens
ZeuS Banking Trojan Report
Zeus
2010-03-03SecureworksJoe Stewart
BlackEnergy Version 2 Threat Analysis
BlackEnergy
2009-06-23SecureworksJoe Stewart
Virut Encryption Analysis
Virut
2008-10-15SecureworksJoe Stewart
The Return of Warezov
Warezov
2007-12-16SecureworksJoe Stewart
Pushdo - Analysis of a Modern Malware Distribution System
Pushdo
2007-12-04SecureworksJoe Stewart
Inside the "Ron Paul" Spam Botnet
Szribi
2007-03-20SecureworksDon Jackson
Gozi Trojan
Gozi
2007-01-09SecureworksJoe Stewart
A Rustock-ing Stuffer
Rustock