Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-03-05ForcepointRobert Neumann, Kurt Natvig
@online{neumann:20210305:advancements:674749e, author = {Robert Neumann and Kurt Natvig}, title = {{Advancements in Invoicing - A highly sophisticated way to distribute ZLoader}}, date = {2021-03-05}, organization = {Forcepoint}, url = {https://www.forcepoint.com/blog/x-labs/invoicing-spam-campaigns-malware-zloader}, language = {English}, urldate = {2021-03-30} } Advancements in Invoicing - A highly sophisticated way to distribute ZLoader
Zloader
2019-04-30ForcepointRobert Neumann
@techreport{neumann:20190430:tinypos:b8d391f, author = {Robert Neumann}, title = {{TinyPOS: An analysis of a Point-Of-Sale malware ecosystem}}, date = {2019-04-30}, institution = {Forcepoint}, url = {https://www.forcepoint.com/sites/default/files/resources/files/report-tinypos-analysis-en.pdf}, language = {English}, urldate = {2019-12-19} } TinyPOS: An analysis of a Point-Of-Sale malware ecosystem
2018-11-28ForcepointRobert Neumann
@online{neumann:20181128:autocad:fd33ef6, author = {Robert Neumann}, title = {{AutoCAD Malware - Computer Aided Theft}}, date = {2018-11-28}, organization = {Forcepoint}, url = {https://www.forcepoint.com/blog/security-labs/autocad-malware-computer-aided-theft}, language = {English}, urldate = {2020-01-10} } AutoCAD Malware - Computer Aided Theft
AutoCAD Downloader
2018-02-08ForcepointRobert Neumann, Luke Somerville
@online{neumann:20180208:udpos:57b42e3, author = {Robert Neumann and Luke Somerville}, title = {{UDPoS - exfiltrating credit card data via DNS}}, date = {2018-02-08}, organization = {Forcepoint}, url = {https://www.forcepoint.com/blog/x-labs/udpos-exfiltrating-credit-card-data-dns}, language = {English}, urldate = {2019-11-25} } UDPoS - exfiltrating credit card data via DNS
UDPoS
2018-02-06ForcepointJohn Bergbom
@online{bergbom:20180206:danderspritzpeddlecheap:b09bc8f, author = {John Bergbom}, title = {{DanderSpritz/PeddleCheap traffic analysis (Part 1 of 2)}}, date = {2018-02-06}, organization = {Forcepoint}, url = {https://www.forcepoint.com/fr/blog/security-labs/new-whitepaper-danderspritzpeddlecheap-traffic-analysis-part-1-2#}, language = {English}, urldate = {2020-05-07} } DanderSpritz/PeddleCheap traffic analysis (Part 1 of 2)
PeddleCheap
2017-03-29ForcepointRoland Dela Paz
@online{paz:20170329:trojanized:867a7ca, author = {Roland Dela Paz}, title = {{Trojanized Adobe installer used to install DragonOK’s new custom backdoor}}, date = {2017-03-29}, organization = {Forcepoint}, url = {https://www.forcepoint.com/de/blog/x-labs/trojanized-adobe-installer-used-install-dragonok-s-new-custom-backdoor}, language = {English}, urldate = {2020-04-06} } Trojanized Adobe installer used to install DragonOK’s new custom backdoor
KHRAT DragonOK
2017-01-17ForcepointNicholas Griffin
@online{griffin:20170117:carbanak:68e7e00, author = {Nicholas Griffin}, title = {{Carbanak Group uses Google for malware command-and-control}}, date = {2017-01-17}, organization = {Forcepoint}, url = {https://www.forcepoint.com/blog/x-labs/carbanak-group-uses-google-malware-command-and-control}, language = {English}, urldate = {2020-05-27} } Carbanak Group uses Google for malware command-and-control
GGLdr
2016-10-21ForcepointRolanda Dela Paz
@online{paz:20161021:bitter:5d8ac74, author = {Rolanda Dela Paz}, title = {{BITTER: a targeted attack against Pakistan}}, date = {2016-10-21}, organization = {Forcepoint}, url = {https://www.forcepoint.com/blog/security-labs/bitter-targeted-attack-against-pakistan}, language = {English}, urldate = {2020-01-13} } BITTER: a targeted attack against Pakistan
Bitter RAT
2016-09-28ForcepointNicholas Griffin
@online{griffin:20160928:highly:c9c3359, author = {Nicholas Griffin}, title = {{Highly Evasive Code Injection Awaits User Interaction Before Delivering Malware}}, date = {2016-09-28}, organization = {Forcepoint}, url = {https://www.forcepoint.com/blog/security-labs/highly-evasive-code-injection-awaits-user-interaction-delivering-malware}, language = {English}, urldate = {2020-01-09} } Highly Evasive Code Injection Awaits User Interaction Before Delivering Malware
BuhTrap
2016-09-22ForcepointNicholas Griffin
@online{griffin:20160922:zeus:94d0df7, author = {Nicholas Griffin}, title = {{Zeus Delivered by DELoader to Defraud Customers of Canadian Banks}}, date = {2016-09-22}, organization = {Forcepoint}, url = {https://www.forcepoint.com/blog/security-labs/zeus-delivered-deloader-defraud-customers-canadian-banks}, language = {English}, urldate = {2020-01-13} } Zeus Delivered by DELoader to Defraud Customers of Canadian Banks
Zloader
2016-08-08ForcepointNicholas Griffin
@online{griffin:20160808:monsoon:ac7eb5b, author = {Nicholas Griffin}, title = {{MONSOON - Analysis Of An APT Campaign}}, date = {2016-08-08}, organization = {Forcepoint}, url = {https://www.forcepoint.com/blog/x-labs/monsoon-analysis-apt-campaign}, language = {English}, urldate = {2020-04-06} } MONSOON - Analysis Of An APT Campaign
BadNews TinyTyphon QUILTED TIGER
2016-08-08ForcepointAndy Settle, Nicholas Griffin, Abel Toro
@techreport{settle:20160808:monsoon:c4f71cc, author = {Andy Settle and Nicholas Griffin and Abel Toro}, title = {{MONSOON – ANALYSIS OF AN APT CAMPAIGN}}, date = {2016-08-08}, institution = {Forcepoint}, url = {https://www.forcepoint.com/sites/default/files/resources/files/forcepoint-security-labs-monsoon-analysis-report.pdf}, language = {English}, urldate = {2020-01-07} } MONSOON – ANALYSIS OF AN APT CAMPAIGN
BadNews TinyTyphon QUILTED TIGER
2016ForcepointAndy Settle, Bapadittya Dey, Nicholas Griffin, Abel Toro
@techreport{settle:2016:analysis:8117245, author = {Andy Settle and Bapadittya Dey and Nicholas Griffin and Abel Toro}, title = {{Analysis of a Botnet Campaign}}, date = {2016}, institution = {Forcepoint}, url = {https://www.forcepoint.com/sites/default/files/resources/files/report_jaku_analysis_of_botnet_campaign_en_0.pdf}, language = {English}, urldate = {2020-01-06} } Analysis of a Botnet Campaign
Jaku