Click here to download all references as Bib-File.
2019-03-28 ⋅ Malware Explorer Blog ⋅ 10 Years Since Ghostnet Gh0stnet |
2017-10-05 ⋅ FireEye ⋅ Significant FormBook Distribution Campaigns Impacting the U.S. and South Korea Formbook |
2016-03-28 ⋅ FireEye ⋅ TREASUREHUNT: A Custom POS Malware Tool TreasureHunter |
2015-05-23 ⋅ FireEye ⋅ NitlovePOS: Another New POS Malware nitlove |
2014-10-06 ⋅ FireEye ⋅ Data Theft in Aisle 9: A FireEye Look at Threats to Retailers |
2014-08-13 ⋅ FireEye ⋅ OPERATION SAFFRON ROSE Flying Kitten |
2014-07-31 ⋅ FireEye ⋅ Spy of the Tiger paladin APT24 |
2014-07-09 ⋅ FireEye ⋅ BrutPOS: RDP Bruteforcing Botnet Targeting POS Systems BrutPOS |
2014-02-19 ⋅ FireEye ⋅ XtremeRAT: Nuisance or Threat? Xtreme RAT |
2013-12-12 ⋅ FireEye Inc ⋅ OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs Tidepool APT15 |
2013-09-21 ⋅ FireEye ⋅ Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog APT17 |
2013-09-21 ⋅ FireEye ⋅ Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog |
2013-09-06 ⋅ FireEye ⋅ Evasive Tactics: Taidoor taidoor Taleret |
2013-08-23 ⋅ FireEye ⋅ Operation Molerats: Middle East Cyber Attacks Using Poison Ivy Poison Ivy Molerats |
2013-08-12 ⋅ FireEye ⋅ Survival of the Fittest: New York Times Attackers Evolve Quickly yayih |
2013-05-20 ⋅ Trend Micro ⋅ Safe - A Targeted Threat SafeNet |
2013 ⋅ Trend Micro ⋅ FAKEM RAT Terminator RAT |
2012-10-23 ⋅ Trend Micro ⋅ Detecting APT Activity with Network Traffic Analysis Enfal Gh0stnet Nitro sykipot taidoor |
2011-10-31 ⋅ Trend Micro ⋅ The Significance of the "Nitro" Attacks Nitro |