Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-06-08Trend MicroMayra Fuentes, Feike Hacquebord, Stephen Hilt, Ian Kenefick, Vladimir Kropotov, Robert McArdle, Fernando Mercês, David Sancho
@techreport{fuentes:20210608:modern:a5dd52c, author = {Mayra Fuentes and Feike Hacquebord and Stephen Hilt and Ian Kenefick and Vladimir Kropotov and Robert McArdle and Fernando Mercês and David Sancho}, title = {{Modern Ransomware’s Double Extortion Tactics and How to Protect Enterprises Against Them}}, date = {2021-06-08}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/white_papers/wp-modern-ransomwares-double-extortion-tactics.pdf}, language = {English}, urldate = {2021-06-16} } Modern Ransomware’s Double Extortion Tactics and How to Protect Enterprises Against Them
Nefilim
2018-03-30Trend MicroDavid Sancho, Numaan Huq, Massimiliano Michenz
@techreport{sancho:20180330:cashing:b325dd3, author = {David Sancho and Numaan Huq and Massimiliano Michenz}, title = {{Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types}}, date = {2018-03-30}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/white_papers/wp-cashing-in-on-atm-malware.pdf}, language = {English}, urldate = {2020-02-27} } Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types
Project Alice ATMitch Ploutus ATM Ripper ATM Skimer SUCEFUL Tyupkin
2017-12-14Trend MicroDavid Sancho, Fernando Mercês
@online{sancho:20171214:dissecting:b2287cd, author = {David Sancho and Fernando Mercês}, title = {{Dissecting PRILEX and CUTLET MAKER ATM Malware Families}}, date = {2017-12-14}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/dissecting-prilex-cutlet-maker-atm-malware-families/}, language = {English}, urldate = {2019-12-17} } Dissecting PRILEX and CUTLET MAKER ATM Malware Families
Prilex
2016-12-20Trend MicroDavid Sancho, Numaan Huq
@online{sancho:20161220:alice:048e628, author = {David Sancho and Numaan Huq}, title = {{Alice: A Lightweight, Compact, No-Nonsense ATM Malware}}, date = {2016-12-20}, organization = {Trend Micro}, url = {http://blog.trendmicro.com/trendlabs-security-intelligence/alice-lightweight-compact-no-nonsense-atm-malware/}, language = {English}, urldate = {2020-01-09} } Alice: A Lightweight, Compact, No-Nonsense ATM Malware
Project Alice
2016-03Trend MicroDavid Sancho, Feike Hacquebord
@techreport{sancho:201603:operation:b3de3b2, author = {David Sancho and Feike Hacquebord}, title = {{Operation C-Major: Information Theft Campaign Targets Military Personnel in India}}, date = {2016-03}, institution = {Trend Micro}, url = {http://documents.trendmicro.com/assets/pdf/Indian-military-personnel-targeted-by-information-theft-campaign-cmajor.pdf}, language = {English}, urldate = {2020-01-07} } Operation C-Major: Information Theft Campaign Targets Military Personnel in India
Operation C-Major
2009-05-22Trend MicroAlice Decker, David Sancho, Loucif Kharouni, Max Goncharov, Robert McArdle
@techreport{decker:20090522:pushdo:518e04c, author = {Alice Decker and David Sancho and Loucif Kharouni and Max Goncharov and Robert McArdle}, title = {{Pushdo / Cutwail Botnet}}, date = {2009-05-22}, institution = {Trend Micro}, url = {https://www.trendmicro.de/cloud-content/us/pdfs/business/white-papers/wp_study-of-pushdo-cutwail-botnet.pdf}, language = {English}, urldate = {2020-01-13} } Pushdo / Cutwail Botnet
Pushdo