Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-09-30FireEyeMike Scott, Ned Moran, Sai Vashisht, Thoufique Haq
NewCT DragonOK
2014-08-29FireEyeKyle Wilhoit, Thoufique Haq
Connecting the Dots: Syrian Malware Team Uses BlackWorm for Attacks
Blackworm RAT
2014-08-13FireEyeMike Scott, Nart Villeneuve, Ned Moran, Thoufique Haq
Flying Kitten
2013-12-12FireEye IncJames T. Bennett, Kenneth Geers, Mike Scott, Nart Villeneuve, Ned Moran, Thoufique Haq
OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs
Tidepool APT15
2013-11-10FireEyeMike Scott, Ned Moran, Sai Omkar Vashisht, Thoufique Haq
Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method
9002 RAT
2013-10-31FireEyeNed Moran, Thoufique Haq
Know Your Enemy: Tracking A Rapidly Evolving APT Actor
Bozok Poison Ivy TEMPER PANDA
2013-09-24FireEyeNed Moran, Thoufique Haq
Now You See Me - H-worm by Houdini
2013-09-06FireEyeNart Villeneuve, Ned Moran, Thoufique Haq
Evasive Tactics: Taidoor
taidoor Taleret
2013-08-23FireEyeNart Villeneuve, Ned Moran, Thoufique Haq
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy
Poison Ivy Molerats
2013-02-07FireEyeJ. Gomez, Thoufique Haq
LadyBoyle Comes to Town with a New Exploit
9002 RAT