Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-04-27Nozomi NetworksNozomi Networks Labs
@online{labs:20220427:industroyer2:a037c0d, author = {Nozomi Networks Labs}, title = {{Industroyer2: Nozomi Networks Labs Analyzes the IEC 104 Payload}}, date = {2022-04-27}, organization = {Nozomi Networks}, url = {https://www.nozominetworks.com/blog/industroyer2-nozomi-networks-labs-analyzes-the-iec-104-payload/}, language = {English}, urldate = {2022-04-29} } Industroyer2: Nozomi Networks Labs Analyzes the IEC 104 Payload
INDUSTROYER2
2022-04-18Nozomi NetworksNozomi Networks Labs
@online{labs:20220418:new:5cad966, author = {Nozomi Networks Labs}, title = {{New BotenaGo Variant Discovered by Nozomi Networks Labs}}, date = {2022-04-18}, organization = {Nozomi Networks}, url = {https://www.nozominetworks.com/blog/new-botenago-variant-discovered-by-nozomi-networks-labs/}, language = {English}, urldate = {2022-04-20} } New BotenaGo Variant Discovered by Nozomi Networks Labs
BotenaGo
2022-03-01Nozomi NetworksNozomi Networks Labs
@online{labs:20220301:how:a8606f9, author = {Nozomi Networks Labs}, title = {{How IoT Botnets Evade Detection and Analysis}}, date = {2022-03-01}, organization = {Nozomi Networks}, url = {https://www.nozominetworks.com/blog/how-iot-botnets-evade-detection-and-analysis/}, language = {English}, urldate = {2022-03-07} } How IoT Botnets Evade Detection and Analysis
Mozi SBIDIOT
2022-01-25Nozomi NetworksAlexey Kleymenov
@online{kleymenov:20220125:how:3c38376, author = {Alexey Kleymenov}, title = {{How to Analyze Malware for Technical Writing}}, date = {2022-01-25}, organization = {Nozomi Networks}, url = {https://www.nozominetworks.com/blog/how-to-analyze-malware-for-technical-writing/}, language = {English}, urldate = {2022-02-02} } How to Analyze Malware for Technical Writing
DarkSide
2021-09-21Nozomi NetworksNozomi Networks Labs
@online{labs:20210921:blackmatter:61b1b27, author = {Nozomi Networks Labs}, title = {{BlackMatter Ransomware Technical Analysis and Tools from Nozomi Networks Labs}}, date = {2021-09-21}, organization = {Nozomi Networks}, url = {https://www.nozominetworks.com/blog/blackmatter-ransomware-technical-analysis-and-tools-from-nozomi-networks-labs/}, language = {English}, urldate = {2021-09-24} } BlackMatter Ransomware Technical Analysis and Tools from Nozomi Networks Labs
BlackMatter
2021-06-22Nozomi NetworksYounes Dragoni
@online{dragoni:20210622:how:9ecf77e, author = {Younes Dragoni}, title = {{How to Dissect Unusual Protocols for Troubleshooting OT Security}}, date = {2021-06-22}, organization = {Nozomi Networks}, url = {https://www.nozominetworks.com/blog/how-to-dissect-unusual-protocols-for-troubleshooting-ot-security/}, language = {English}, urldate = {2021-09-24} } How to Dissect Unusual Protocols for Troubleshooting OT Security
2021-05-19Nozomi NetworksAlexey Kleymenov
@online{kleymenov:20210519:colonial:e537383, author = {Alexey Kleymenov}, title = {{Colonial Pipeline Ransomware Attack: Revealing How DarkSide Works}}, date = {2021-05-19}, organization = {Nozomi Networks}, url = {https://www.nozominetworks.com/blog/colonial-pipeline-ransomware-attack-revealing-how-darkside-works/}, language = {English}, urldate = {2021-05-26} } Colonial Pipeline Ransomware Attack: Revealing How DarkSide Works
DarkSide
2021-04-07Nozomi NetworksNozomi Networks Labs
@online{labs:20210407:threat:d965e73, author = {Nozomi Networks Labs}, title = {{Threat Intelligence: Analysis of the SBIDIOT IoT Malware}}, date = {2021-04-07}, organization = {Nozomi Networks}, url = {https://www.nozominetworks.com/blog/threat-intelligence-analysis-of-the-sbidiot-iot-malware/}, language = {English}, urldate = {2021-10-24} } Threat Intelligence: Analysis of the SBIDIOT IoT Malware
SBIDIOT
2020-10-13Nozomi NetworksAlessandro Di Pinto
@online{pinto:20201013:overcoming:91cef54, author = {Alessandro Di Pinto}, title = {{Overcoming the Challenges of Detecting P2P Botnets on Your Network}}, date = {2020-10-13}, organization = {Nozomi Networks}, url = {https://www.nozominetworks.com/blog/overcoming-the-challenges-of-detecting-p2p-botnets-on-your-network/}, language = {English}, urldate = {2021-09-28} } Overcoming the Challenges of Detecting P2P Botnets on Your Network
Mozi
2019-02-12Nozomi NetworksAlessandro Di Pinto
@online{pinto:20190212:greyenergy:1acfcdf, author = {Alessandro Di Pinto}, title = {{GreyEnergy Malware Research Paper: Maldoc to Backdoor}}, date = {2019-02-12}, organization = {Nozomi Networks}, url = {https://www.nozominetworks.com/2019/02/12/blog/greyenergy-malware-research-paper-maldoc-to-backdoor/}, language = {English}, urldate = {2020-01-10} } GreyEnergy Malware Research Paper: Maldoc to Backdoor
GreyEnergy
2018-08-08Nozomi NetworksAlessandro Di Pinto, Younes Dragoni, Andrea Carcano
@techreport{pinto:20180808:triton:7c9e25d, author = {Alessandro Di Pinto and Younes Dragoni and Andrea Carcano}, title = {{TRITON: The First ICS Cyber Attack on Safety Instrument Systems}}, date = {2018-08-08}, institution = {Nozomi Networks}, url = {https://www.nozominetworks.com//downloads/US/Nozomi-Networks-TRITON-The-First-SIS-Cyberattack.pdf}, language = {English}, urldate = {2021-09-24} } TRITON: The First ICS Cyber Attack on Safety Instrument Systems
Triton