Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-03-30Trend MicroDavid Sancho, Numaan Huq, Massimiliano Michenz
@techreport{sancho:20180330:cashing:b325dd3, author = {David Sancho and Numaan Huq and Massimiliano Michenz}, title = {{Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types}}, date = {2018-03-30}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/white_papers/wp-cashing-in-on-atm-malware.pdf}, language = {English}, urldate = {2020-02-27} } Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types
Project Alice ATMitch Ploutus ATM Ripper ATM Skimer SUCEFUL Tyupkin
2016-12-20Trend MicroDavid Sancho, Numaan Huq
@online{sancho:20161220:alice:048e628, author = {David Sancho and Numaan Huq}, title = {{Alice: A Lightweight, Compact, No-Nonsense ATM Malware}}, date = {2016-12-20}, organization = {Trend Micro}, url = {http://blog.trendmicro.com/trendlabs-security-intelligence/alice-lightweight-compact-no-nonsense-atm-malware/}, language = {English}, urldate = {2020-01-09} } Alice: A Lightweight, Compact, No-Nonsense ATM Malware
Project Alice
2016-09-19Trend MicroNumaan Huq
@online{huq:20160919:untangling:daa62bd, author = {Numaan Huq}, title = {{Untangling the Ripper ATM Malware}}, date = {2016-09-19}, organization = {Trend Micro}, url = {http://blog.trendmicro.com/trendlabs-security-intelligence/untangling-ripper-atm-malware/}, language = {English}, urldate = {2019-11-26} } Untangling the Ripper ATM Malware
Ripper ATM
2014-10-27Trend MicroLoucif Kharouni, Feike Hacquebord, Numaan Huq, Jim Gogolinski, Fernando Mercês, Alfred Remorin, Douglas Otis
@techreport{kharouni:20141027:operation:1b13f15, author = {Loucif Kharouni and Feike Hacquebord and Numaan Huq and Jim Gogolinski and Fernando Mercês and Alfred Remorin and Douglas Otis}, title = {{Operation Pawn Storm: Using Decoys to Evade Detection}}, date = {2014-10-27}, institution = {Trend Micro}, url = {https://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-pawn-storm.pdf}, language = {English}, urldate = {2020-09-15} } Operation Pawn Storm: Using Decoys to Evade Detection
Sedreco Seduploader APT28
2014-10Trend MicroLoucif Kharouni, Feike Hacquebord, Numaan Huq, Jim Gogolinski, Fernando Mercês, Alfred Remorin, Douglas Otis
@techreport{kharouni:201410:operation:f1d1705, author = {Loucif Kharouni and Feike Hacquebord and Numaan Huq and Jim Gogolinski and Fernando Mercês and Alfred Remorin and Douglas Otis}, title = {{Operation Pawn Storm: Using Decoys to Evade Detection}}, date = {2014-10}, institution = {Trend Micro}, url = {http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-pawn-storm.pdf}, language = {English}, urldate = {2019-11-28} } Operation Pawn Storm: Using Decoys to Evade Detection
2014-09WiredNumaan Huq
@techreport{huq:201409:pos:e79a593, author = {Numaan Huq}, title = {{PoS RAM Scraper Malware}}, date = {2014-09}, institution = {Wired}, url = {https://www.wired.com/wp-content/uploads/2014/09/wp-pos-ram-scraper-malware.pdf}, language = {English}, urldate = {2020-01-07} } PoS RAM Scraper Malware
Decebal rdasrv