Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-16MandiantMathew Potaczek, Takahiro Sugiyama, Logeswaran Nadarajan, Yu Nakamura, Joshua Homan, Martin Co, Sylvain Hirsch
@online{potaczek:20220316:have:42cad90, author = {Mathew Potaczek and Takahiro Sugiyama and Logeswaran Nadarajan and Yu Nakamura and Joshua Homan and Martin Co and Sylvain Hirsch}, title = {{Have Your Cake and Eat it Too? An Overview of UNC2891}}, date = {2022-03-16}, organization = {Mandiant}, url = {https://www.mandiant.com/resources/unc2891-overview}, language = {English}, urldate = {2022-03-17} } Have Your Cake and Eat it Too? An Overview of UNC2891
SLAPSTICK STEELCORGI
2015-04-18FireEyeDan Caselden, Yasir Khalid, James “Tom” Bennett, Genwei Jiang, Corbin Souffrant, Joshua Homan, Jonathan Wrolstad, Chris Phillips, Darien Kin
@online{caselden:20150418:operation:f2f3cba, author = {Dan Caselden and Yasir Khalid and James “Tom” Bennett and Genwei Jiang and Corbin Souffrant and Joshua Homan and Jonathan Wrolstad and Chris Phillips and Darien Kin}, title = {{Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack}}, date = {2015-04-18}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html}, language = {English}, urldate = {2019-10-16} } Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack
APT28
2014-11-21FireEyeNed Moran, Mike Scott, Mike Oppenheim, Joshua Homan
@online{moran:20141121:operation:18b04d9, author = {Ned Moran and Mike Scott and Mike Oppenheim and Joshua Homan}, title = {{Operation Double Tap}}, date = {2014-11-21}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2014/11/operation_doubletap.html}, language = {English}, urldate = {2019-12-20} } Operation Double Tap
pirpi
2014-07-31FireEyeNart Villeneuve, Joshua Homan
@online{villeneuve:20140731:spy:5aeca9b, author = {Nart Villeneuve and Joshua Homan}, title = {{Spy of the Tiger}}, date = {2014-07-31}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2014/07/spy-of-the-tiger.html}, language = {English}, urldate = {2019-12-20} } Spy of the Tiger
paladin APT24
2014-07-09FireEyeNart Villeneuve, Kyle Wilhoit, Joshua Homan
@online{villeneuve:20140709:brutpos:12328f8, author = {Nart Villeneuve and Kyle Wilhoit and Joshua Homan}, title = {{BrutPOS: RDP Bruteforcing Botnet Targeting POS Systems}}, date = {2014-07-09}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2014/07/brutpos-rdp-bruteforcing-botnet-targeting-pos-systems.html}, language = {English}, urldate = {2019-12-20} } BrutPOS: RDP Bruteforcing Botnet Targeting POS Systems
BrutPOS