Click here to download all references as Bib-File.•
2019-03-28
⋅
Malware Explorer Blog
⋅
10 Years Since Ghostnet Gh0stnet |
2017-10-05
⋅
FireEye
⋅
Significant FormBook Distribution Campaigns Impacting the U.S. and South Korea Formbook |
2016-03-28
⋅
FireEye
⋅
TREASUREHUNT: A Custom POS Malware Tool TreasureHunter |
2015-05-23
⋅
FireEye
⋅
NitlovePOS: Another New POS Malware nitlove |
2014-10-06
⋅
FireEye
⋅
Data Theft in Aisle 9: A FireEye Look at Threats to Retailers |
2014-08-13
⋅
FireEye
⋅
OPERATION SAFFRON ROSE Flying Kitten |
2014-07-31
⋅
FireEye
⋅
Spy of the Tiger paladin APT24 |
2014-07-09
⋅
FireEye
⋅
BrutPOS: RDP Bruteforcing Botnet Targeting POS Systems BrutPOS |
2014-02-19
⋅
FireEye
⋅
XtremeRAT: Nuisance or Threat? Xtreme RAT |
2013-12-12
⋅
FireEye Inc
⋅
OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs Tidepool APT15 |
2013-09-21
⋅
FireEye
⋅
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog APT17 |
2013-09-21
⋅
FireEye
⋅
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog |
2013-09-06
⋅
FireEye
⋅
Evasive Tactics: Taidoor taidoor Taleret |
2013-08-23
⋅
FireEye
⋅
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy Poison Ivy Molerats |
2013-08-12
⋅
FireEye
⋅
Survival of the Fittest: New York Times Attackers Evolve Quickly yayih |
2013-05-20
⋅
Trend Micro
⋅
Safe - A Targeted Threat SafeNet |
2013-01-01
⋅
Trend Micro
⋅
FAKEM RAT Terminator RAT |
2012-10-23
⋅
Trend Micro
⋅
Detecting APT Activity with Network Traffic Analysis Enfal Gh0stnet Nitro sykipot taidoor |
2011-10-31
⋅
Trend Micro
⋅
The Significance of the "Nitro" Attacks Nitro |