Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-02-18Trend MicroDaniel Lunghi, Cedric Pernet, Kenney Lu, Jamz Yaneza
@online{lunghi:20200218:uncovering:93b0937, author = {Daniel Lunghi and Cedric Pernet and Kenney Lu and Jamz Yaneza}, title = {{Uncovering DRBControl: Inside the Cyberespionage Campaign Targeting Gambling Operations}}, date = {2020-02-18}, organization = {Trend Micro}, url = {https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/operation-drbcontrol-uncovering-a-cyberespionage-campaign-targeting-gambling-companies-in-southeast-asia}, language = {English}, urldate = {2020-02-20} } Uncovering DRBControl: Inside the Cyberespionage Campaign Targeting Gambling Operations
Cobalt Strike HyperBro PlugX Trochilus RAT
2020-02-18Trend MicroDaniel Lunghi, Cedric Pernet, Kenney Lu, Jamz Yaneza
@techreport{lunghi:20200218:uncovering:d96f725, author = {Daniel Lunghi and Cedric Pernet and Kenney Lu and Jamz Yaneza}, title = {{Uncovering DRBControl}}, date = {2020-02-18}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/white_papers/wp-uncovering-DRBcontrol.pdf}, language = {English}, urldate = {2020-04-01} } Uncovering DRBControl
Clambling
2019-12-12Trend MicroFeike Hacquebord, Cedric Pernet, Kenney Lu
@online{hacquebord:20191212:more:a1e84b7, author = {Feike Hacquebord and Cedric Pernet and Kenney Lu}, title = {{More than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targeting}}, date = {2019-12-12}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/more-than-a-dozen-obfuscated-apt33-botnets-used-for-extreme-narrow-targeting/}, language = {English}, urldate = {2020-01-13} } More than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targeting
APT33
2018-08-21Trend MicroJaromír Hořejší, Joseph C. Chen, Kawabata Kohei, Kenney Lu
@online{hoej:20180821:supply:d426e6b, author = {Jaromír Hořejší and Joseph C. Chen and Kawabata Kohei and Kenney Lu}, title = {{Supply Chain Attack Operation Red Signature Targets South Korean Organizations}}, date = {2018-08-21}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/supply-chain-attack-operation-red-signature-targets-south-korean-organizations/}, language = {English}, urldate = {2020-01-06} } Supply Chain Attack Operation Red Signature Targets South Korean Organizations
9002 RAT
2017-05-09Trend MicroTim Yeh, Dove Chiu, Kenney Lu
@online{yeh:20170509:persirai:986b0fb, author = {Tim Yeh and Dove Chiu and Kenney Lu}, title = {{Persirai: New Internet of Things (IoT) Botnet Targets IP Cameras}}, date = {2017-05-09}, organization = {Trend Micro}, url = {http://blog.trendmicro.com/trendlabs-security-intelligence/persirai-new-internet-things-iot-botnet-targets-ip-cameras/}, language = {English}, urldate = {2020-01-13} } Persirai: New Internet of Things (IoT) Botnet Targets IP Cameras
Persirai
2015-03-24Trend MicroCedric Pernet, Kenney Lu
@techreport{pernet:20150324:operation:65e881c, author = {Cedric Pernet and Kenney Lu}, title = {{Operation Woolen-Goldfish: When Kittens Go Phishing}}, date = {2015-03-24}, institution = {Trend Micro}, url = {http://www.trendmicro.it/media/wp/operation-woolen-goldfish-whitepaper-en.pdf}, language = {English}, urldate = {2019-07-09} } Operation Woolen-Goldfish: When Kittens Go Phishing
Ghole Woolger