Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-03-28Malware Explorer BlogNart Villeneuve
10 Years Since Ghostnet
Gh0stnet
2017-10-05FireEyeNart Villeneuve, Randi Eitzman, Sandor Nemes, Tyler Dean
Significant FormBook Distribution Campaigns Impacting the U.S. and South Korea
Formbook
2016-03-28FireEyeNart Villeneuve
TREASUREHUNT: A Custom POS Malware Tool
TreasureHunter
2015-05-23FireEyeDaniel Regalado, Nart Villeneuve
NitlovePOS: Another New POS Malware
nitlove
2014-10-06FireEyeNart Villeneuve
Data Theft in Aisle 9: A FireEye Look at Threats to Retailers
2014-08-13FireEyeMike Scott, Nart Villeneuve, Ned Moran, Thoufique Haq
OPERATION SAFFRON ROSE
Flying Kitten
2014-07-31FireEyeJoshua Homan, Nart Villeneuve
Spy of the Tiger
paladin APT24
2014-07-09FireEyeJoshua Homan, Kyle Wilhoit, Nart Villeneuve
BrutPOS: RDP Bruteforcing Botnet Targeting POS Systems
BrutPOS
2014-02-19FireEyeJames T. Bennett, Nart Villeneuve
XtremeRAT: Nuisance or Threat?
Xtreme RAT
2013-12-12FireEye IncJames T. Bennett, Kenneth Geers, Mike Scott, Nart Villeneuve, Ned Moran, Thoufique Haq
OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs
Tidepool APT15
2013-09-21FireEyeNart Villeneuve, Ned Moran
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets
DeputyDog APT17
2013-09-21FireEyeNart Villeneuve, Ned Moran
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets
DeputyDog
2013-09-06FireEyeNart Villeneuve, Ned Moran, Thoufique Haq
Evasive Tactics: Taidoor
taidoor Taleret
2013-08-23FireEyeNart Villeneuve, Ned Moran, Thoufique Haq
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy
Poison Ivy Molerats
2013-08-12FireEyeNart Villeneuve, Ned Moran
Survival of the Fittest: New York Times Attackers Evolve Quickly
yayih
2013-05-20Trend MicroKyle Wilhoit, Nart Villeneuve
Safe - A Targeted Threat
SafeNet
2013-01-01Trend MicroJessa dela Torre, Nart Villeneuve
FAKEM RAT
Terminator RAT
2012-10-23Trend MicroJames T. Bennett, Nart Villeneuve
Detecting APT Activity with Network Traffic Analysis
Enfal Gh0stnet Nitro sykipot taidoor
2011-10-31Trend MicroNart Villeneuve
The Significance of the "Nitro" Attacks
Nitro