Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-11-20360 netlabHui Wang, Alex Turing, CNCERT, Qihoo 360
@online{wang:20201120:moobot:bee7c03, author = {Hui Wang and Alex Turing and CNCERT and Qihoo 360}, title = {{MooBot on the run using another 0 day targeting UNIX CCTV DVR}}, date = {2020-11-20}, organization = {360 netlab}, url = {https://blog.netlab.360.com/moobot-0day-unixcctv-dvr-en/}, language = {English}, urldate = {2020-11-23} } MooBot on the run using another 0 day targeting UNIX CCTV DVR
MooBot
2020-04-06360.cnQihoo 360
@online{360:20200406:darkhotel:78f0a7f, author = {Qihoo 360}, title = {{The DarkHotel (APT-C-06) Attacked Chinese Institutions Abroad via Exploiting SangFor VPN Vulnerability}}, date = {2020-04-06}, organization = {360.cn}, url = {https://blogs.360.cn/post/APT_Darkhotel_attacks_during_coronavirus_pandemic.html}, language = {English}, urldate = {2020-04-07} } The DarkHotel (APT-C-06) Attacked Chinese Institutions Abroad via Exploiting SangFor VPN Vulnerability
2020-03-02Qihoo 360 TechnologyQihoo 360
@online{360:20200302:cia:d88b9c9, author = {Qihoo 360}, title = {{The CIA Hacking Group (APT-C-39) Conducts Cyber-Espionage Operation on China's Critical Industries for 11 Years}}, date = {2020-03-02}, organization = {Qihoo 360 Technology}, url = {http://blogs.360.cn/post/APT-C-39_CIA_EN.html}, language = {English}, urldate = {2020-03-03} } The CIA Hacking Group (APT-C-39) Conducts Cyber-Espionage Operation on China's Critical Industries for 11 Years
Longhorn
2019-06-21Network Security Research Lab @ Qihoo 360Alex Turing, yegenshen
@online{turing:20190621:analysis:2b57ddf, author = {Alex Turing and yegenshen}, title = {{An Analysis of Linux.Ngioweb Botnet}}, date = {2019-06-21}, organization = {Network Security Research Lab @ Qihoo 360}, url = {https://blog.netlab.360.com/an-analysis-of-linux-ngioweb-botnet-en/}, language = {English}, urldate = {2019-10-14} } An Analysis of Linux.Ngioweb Botnet
Ngioweb
2018-09-21Qihoo 360 TechnologyQihoo 360
@online{360:20180921:poison:d1cab92, author = {Qihoo 360}, title = {{Poison Ivy Group and the Cyberespionage Campaign Against Chinese Military and Goverment}}, date = {2018-09-21}, organization = {Qihoo 360 Technology}, url = {http://blogs.360.cn/post/APT_C_01_en.html}, language = {English}, urldate = {2019-11-29} } Poison Ivy Group and the Cyberespionage Campaign Against Chinese Military and Goverment
Poison Ivy
2018Qihoo 360 TechnologyYa Liu, Hui Wang
@online{liu:2018:tracking:2ca5e73, author = {Ya Liu and Hui Wang}, title = {{Tracking Mirai variants (Appendix: Hashes)}}, date = {2018}, organization = {Qihoo 360 Technology}, url = {https://www.virusbulletin.com/virusbulletin/2018/12/vb2018-paper-tracking-mirai-variants/#h2-appendix-sample-sha256-hashes}, language = {English}, urldate = {2019-11-27} } Tracking Mirai variants (Appendix: Hashes)
Masuta