Click here to download all references as Bib-File.•
| 2023-05-22
⋅
eSentire
⋅
The Hunt for VENOM SPIDER PART 2 VENOM SPIDER |
| 2023-04-26
⋅
eSentire
⋅
Gootloader Unloaded: Researchers Launch Multi-Pronged Offensive Against Gootloader, Cutting Off Traffic to Thousands of Gootloader Web Pages and Using the Operator’s Very Own Tactics to Protect End-Users GootLoader |
| 2023-01-24
⋅
eSentire
⋅
Unmasking Venom Spider More_eggs TerraPreter TerraLoader VenomLNK |
| 2013-07-31
⋅
Secureworks
⋅
Secrets of the Comfoo Masters Comfoo |
| 2011-08-03
⋅
Secureworks
⋅
HTran and the Advanced Persistent Threat HTran |
| 2010-03-03
⋅
Secureworks
⋅
BlackEnergy Version 2 Threat Analysis BlackEnergy |
| 2009-06-23
⋅
Secureworks
⋅
Virut Encryption Analysis Virut |
| 2008-10-15
⋅
Secureworks
⋅
The Return of Warezov Warezov |
| 2007-12-16
⋅
Secureworks
⋅
Pushdo - Analysis of a Modern Malware Distribution System Pushdo |
| 2007-12-04
⋅
Secureworks
⋅
Inside the "Ron Paul" Spam Botnet Szribi |
| 2007-01-09
⋅
Secureworks
⋅
A Rustock-ing Stuffer Rustock |