Property:Citation text

From attackics
Jump to navigation Jump to search
Showing 20 pages using this property.
R
[https://cyware.com/news/altran-technologies-hit-by-lockergoga-ransomware-attack-e1f90570 Ryan Stewart. (n.d.). Retrieved October 16, 2019.]  +
[http://windowsitpro.com/systems-management/psexec Russinovich, M. (2004, June 28). PsExec. Retrieved December 17, 2015.]  +
[http://www.truesec.com/Tools/Tool/gsecdump_v2.0b5 TrueSec. (n.d.). gsecdump v2.0b5. Retrieved September 29, 2015.]  +
[https://www.fireeye.com/blog/threat-research/2014/07/spy-of-the-tiger.html Villeneuve, N., Homan, J. (2014, July 31). Spy of the Tiger. Retrieved September 29, 2015.]  +
[http://blog.cassidiancybersecurity.com/post/2014/07/The-Eye-of-the-Tiger2 Bizeul, D., Fontarensky, I., Mouchoux, R., Perigaud, F., Pernet, C. (2014, July 11). Eye of the Tiger. Retrieved September 29, 2015.]  +
[https://github.com/gentilkiwi/mimikatz Deply, B. (n.d.). Mimikatz. Retrieved September 29, 2015.]  +
[https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-operation-quantum-entanglement.pdf Haq, T., Moran, N., Vashisht, S., Scott, M. (2014, September). OPERATION QUANTUM ENTANGLEMENT. Retrieved November 4, 2015.]  +
[https://dl.mandiant.com/EE/library/MIRcon2014/MIRcon_2014_R&D_Track_Insight_into_Symbiotic_APT.pdf Haq, T. (2014, October). An Insight into Symbiotic APT Groups. Retrieved November 4, 2015.]  +
[http://researchcenter.paloaltonetworks.com/2015/04/unit-42-identifies-new-dragonok-backdoor-malware-deployed-against-japanese-targets/ Miller-Osborn, J., Grunzweig, J.. (2015, April). Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets. Retrieved November 4, 2015.]  +
[https://blogs.technet.microsoft.com/srd/2014/04/08/ms14-019-fixing-a-binary-hijacking-via-cmd-or-bat-file/ Nagaraju, S. (2014, April 8). MS14-019 – Fixing a binary hijacking via .cmd or .bat file. Retrieved July 25, 2016.]  +
[http://labs.lastline.com/an-analysis-of-plugx Vasilenko, R. (2013, December 17). An Analysis of PlugX Malware. Retrieved November 24, 2015.]  +
[http://blog.trendmicro.com/trendlabs-security-intelligence/in-depth-look-apt-attack-tools-of-the-trade/ Wilhoit, K. (2013, March 4). In-Depth Look: APT Attack Tools of the Trade. Retrieved December 2, 2015.]  +
[https://technet.microsoft.com/en-us/library/dn408187.aspx Microsoft. (2013, July 31). Configuring Additional LSA Protection. Retrieved June 24, 2015.]  +
[https://www.fireeye.com/blog/threat-research/2015/11/china-based-threat.html FireEye Threat Intelligence. (2015, December 1). China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets. Retrieved December 4, 2015.]  +
[https://securelist.com/blog/research/72924/sofacy-apt-hits-high-profile-targets-with-updated-toolset/ Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015.]  +
[https://www.f-secure.com/documents/996508/1030745/CozyDuke F-Secure Labs. (2015, April 22). CozyDuke: Malware Analysis. Retrieved December 10, 2015.]  +
[https://www.f-secure.com/documents/996508/1030745/dukes_whitepaper.pdf F-Secure Labs. (2015, September 17). The Dukes: 7 years of Russian cyberespionage. Retrieved December 10, 2015.]  +
[http://www.mitre.org/capabilities/cybersecurity/overview/cybersecurity-blog/copernicus-question-your-assumptions-about Butterworth, J. (2013, July 30). Copernicus: Question Your Assumptions about BIOS Security. Retrieved December 11, 2015.]  +
[http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-uses-uefi-bios-rootkit-to-keep-rcs-9-agent-in-target-systems/ Lin, P. (2015, July 13). Hacking Team Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems. Retrieved December 11, 2015.]  +
[http://www.ampliasecurity.com/research/wcefaq.html Amplia Security. (n.d.). Windows Credentials Editor (WCE) F.A.Q.. Retrieved December 17, 2015.]  +