- Derusbi
- Destory RAT
- Kaba
- Sogu
- Thoper
- TVT
- Gulpix
Malware References
- http://blogs.cisco.com/security/talos/threat-spotlight-group-72
- https://www.circl.lu/pub/tr-24/
- http://labs.lastline.com/an-analysis-of-plugx
- https://www.fireeye.com/blog/threat-research/2014/07/pacific-ring-of-fire-plugx-kaba.html
- https://www.fireeye.com/blog/threat-research/2013/11/exploit-proliferation-additional-threat-groups-acquire-cve-2013-3906.html
- http://blog.cassidiancybersecurity.com/post/2014/01/plugx-some-uncovered-points.html
- https://www.fireeye.com/blog/threat-research/2014/06/clandestine-fox-part-deux.html
- http://researchcenter.paloaltonetworks.com/2015/05/plugx-uses-legitimate-samsung-application-for-dll-side-loading/
- http://www.csee.umbc.edu/courses/undergraduate/CMSC491malware/fireeye-malware-supply-chain.pdf
- https://securityledger.com/2013/11/malware-supply-chain-links-eleven-attacks/
- https://www.blackhat.com/docs/asia-14/materials/Haruyama/Asia-14-Haruyama-I-Know-You-Want-Me-Unplugging-PlugX.pdf
- http://circl.lu/assets/files/tr-12/tr-12-circl-plugx-analysis-v1.pdf
No comments:
Post a Comment