Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-05-06Twitter (@moranned)Ned Moran
@online{moran:20200506:side:eeb6cac, author = {Ned Moran}, title = {{Tweet on side effects of Doxing in the context OilRig}}, date = {2020-05-06}, organization = {Twitter (@moranned)}, url = {https://twitter.com/moranned/status/1258040513883766784}, language = {English}, urldate = {2020-05-07} } Tweet on side effects of Doxing in the context OilRig
2015-08-10shadowserverNed Moran, Ben Koehl
@techreport{moran:20150810:italian:26b33c4, author = {Ned Moran and Ben Koehl}, title = {{The Italian Connection: An analysis of exploit supply chains and digital quartermasters}}, date = {2015-08-10}, institution = {shadowserver}, url = {https://paper.seebug.org/papers/APT/APT_CyberCriminal_Campagin/2015/Aug.10.The_Italian_Connection_An_analysis_of_exploit_supply_chains_and_digital_quartermasters/HTExploitTelemetry.pdf}, language = {English}, urldate = {2020-01-07} } The Italian Connection: An analysis of exploit supply chains and digital quartermasters
smac Violin Panda
2014-11-21FireEyeNed Moran, Mike Scott, Mike Oppenheim, Joshua Homan
@online{moran:20141121:operation:18b04d9, author = {Ned Moran and Mike Scott and Mike Oppenheim and Joshua Homan}, title = {{Operation Double Tap}}, date = {2014-11-21}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2014/11/operation_doubletap.html}, language = {English}, urldate = {2019-12-20} } Operation Double Tap
pirpi
2014-09-30FireEyeThoufique Haq, Ned Moran, Sai Vashisht, Mike Scott
@techreport{haq:20140930:operation:ce4e85c, author = {Thoufique Haq and Ned Moran and Sai Vashisht and Mike Scott}, title = {{OPERATION QUANTUM ENTANGLEMENT}}, date = {2014-09-30}, institution = {FireEye}, url = {https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-operation-quantum-entanglement.pdf}, language = {English}, urldate = {2020-01-08} } OPERATION QUANTUM ENTANGLEMENT
NewCT DragonOK
2014-09-03FireEyeNed Moran, Mike Oppenheim
@online{moran:20140903:darwins:1b05935, author = {Ned Moran and Mike Oppenheim}, title = {{Darwin’s Favorite APT Group}}, date = {2014-09-03}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2014/09/darwins-favorite-apt-group-2.html}, language = {English}, urldate = {2019-12-20} } Darwin’s Favorite APT Group
EtumBot ThreeByte WaterSpout IXESHE
2014-08-13FireEyeNart Villeneuve, Ned Moran, Thoufique Haq, Mike Scott
@techreport{villeneuve:20140813:operation:177e7ba, author = {Nart Villeneuve and Ned Moran and Thoufique Haq and Mike Scott}, title = {{OPERATION SAFFRON ROSE}}, date = {2014-08-13}, institution = {FireEye}, url = {https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-operation-saffron-rose.pdf}, language = {English}, urldate = {2020-01-10} } OPERATION SAFFRON ROSE
Flying Kitten
2014-03-25FireEyeAlex Lanstein, Ned Moran
@online{lanstein:20140325:spear:762baf1, author = {Alex Lanstein and Ned Moran}, title = {{Spear Phishing the News Cycle: APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370}}, date = {2014-03-25}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2014/03/spear-phishing-the-news-cycle-apt-actors-leverage-interest-in-the-disappearance-of-malaysian-flight-mh-370.html}, language = {English}, urldate = {2019-12-20} } Spear Phishing the News Cycle: APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370
Naikon
2014-03-12FireEyeNed Moran, Mike Oppenheim
@online{moran:20140312:detailed:79efe09, author = {Ned Moran and Mike Oppenheim}, title = {{A Detailed Examination of the Siesta Campaign}}, date = {2014-03-12}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2014/03/a-detailed-examination-of-the-siesta-campaign.html}, language = {English}, urldate = {2019-12-20} } A Detailed Examination of the Siesta Campaign
Comment Crew Siesta
2013-12-12FireEye IncNart Villeneuve, James T. Bennett, Ned Moran, Thoufique Haq, Mike Scott, Kenneth Geers
@techreport{villeneuve:20131212:operation:70b2323, author = {Nart Villeneuve and James T. Bennett and Ned Moran and Thoufique Haq and Mike Scott and Kenneth Geers}, title = {{OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs}}, date = {2013-12-12}, institution = {FireEye Inc}, url = {https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-operation-ke3chang.pdf}, language = {English}, urldate = {2019-10-27} } OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs
Tidepool Mirage
2013-11-10FireEyeSai Omkar Vashisht, Mike Scott, Thoufique Haq, Ned Moran
@online{vashisht:20131110:operation:d653a09, author = {Sai Omkar Vashisht and Mike Scott and Thoufique Haq and Ned Moran}, title = {{Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method}}, date = {2013-11-10}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2013/11/operation-ephemeral-hydra-ie-zero-day-linked-to-deputydog-uses-diskless-method.html}, language = {English}, urldate = {2019-12-20} } Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method
9002 RAT
2013-10-31FireEyeThoufique Haq, Ned Moran
@online{haq:20131031:know:e772ee9, author = {Thoufique Haq and Ned Moran}, title = {{Know Your Enemy: Tracking A Rapidly Evolving APT Actor}}, date = {2013-10-31}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2013/10/know-your-enemy-tracking-a-rapidly-evolving-apt-actor.html}, language = {English}, urldate = {2019-12-20} } Know Your Enemy: Tracking A Rapidly Evolving APT Actor
Bozok Poison Ivy Temper Panda
2013-09-24FireEyeThoufique Haq, Ned Moran
@online{haq:20130924:now:3cc13be, author = {Thoufique Haq and Ned Moran}, title = {{Now You See Me - H-worm by Houdini}}, date = {2013-09-24}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2013/09/now-you-see-me-h-worm-by-houdini.html}, language = {English}, urldate = {2019-12-20} } Now You See Me - H-worm by Houdini
Houdini
2013-09-21FireEyeNed Moran, Nart Villeneuve
@online{moran:20130921:operation:0289318, author = {Ned Moran and Nart Villeneuve}, title = {{Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets}}, date = {2013-09-21}, organization = {FireEye}, url = {https://web.archive.org/web/20130924130243/https://www.fireeye.com/blog/technical/cyber-exploits/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html}, language = {English}, urldate = {2020-06-08} } Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets
DeputyDog Aurora Panda
2013-09-21FireEyeNart Villeneuve, Ned Moran
@online{villeneuve:20130921:operation:1e6ef8d, author = {Nart Villeneuve and Ned Moran}, title = {{Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets}}, date = {2013-09-21}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html}, language = {English}, urldate = {2019-12-20} } Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets
DeputyDog
2013-09-06FireEyeNart Villeneuve, Thoufique Haq, Ned Moran
@online{villeneuve:20130906:evasive:1f16aab, author = {Nart Villeneuve and Thoufique Haq and Ned Moran}, title = {{Evasive Tactics: Taidoor}}, date = {2013-09-06}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2013/09/evasive-tactics-taidoor-3.html}, language = {English}, urldate = {2019-12-20} } Evasive Tactics: Taidoor
taidoor Taleret
2013-08-23FireEyeNart Villeneuve, Thoufique Haq, Ned Moran
@online{villeneuve:20130823:operation:dc4b5d6, author = {Nart Villeneuve and Thoufique Haq and Ned Moran}, title = {{Operation Molerats: Middle East Cyber Attacks Using Poison Ivy}}, date = {2013-08-23}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html}, language = {English}, urldate = {2019-12-20} } Operation Molerats: Middle East Cyber Attacks Using Poison Ivy
Poison Ivy Molerats
2013-08-12FireEyeNart Villeneuve, Ned Moran
@online{villeneuve:20130812:survival:4544f24, author = {Nart Villeneuve and Ned Moran}, title = {{Survival of the Fittest: New York Times Attackers Evolve Quickly}}, date = {2013-08-12}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2013/08/survival-of-the-fittest-new-york-times-attackers-evolve-quickly.html}, language = {English}, urldate = {2019-12-20} } Survival of the Fittest: New York Times Attackers Evolve Quickly
yayih
2013-05-20FireEyeNed Moran
@online{moran:20130520:ready:6a59df8, author = {Ned Moran}, title = {{Ready for Summer: The Sunshop Campaign}}, date = {2013-05-20}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2013/05/ready-for-summer-the-sunshop-campaign.html}, language = {English}, urldate = {2019-12-20} } Ready for Summer: The Sunshop Campaign
9002 RAT