Targeted Attacks Against The Energy Sector |
Jan |
Symantec |
Emerging Threat Profile Shell_Crew |
Jan |
RSA |
New Cdto: A Sneakernet Trojan Solution |
Jan |
Fidelis |
Intruder File Report- Sneakernet Trojan |
Jan |
Fidelis |
Uroburos Highly Complex Espionage Software With Russian Roots |
Feb |
GDATA |
Unveiling Careto - The Masked Apt |
Feb |
Kaspersky |
Mapping Hacking Teams Untraceable Spyware |
Feb |
The Citizen Lab |
Gathering In The Middle East, Operation Stteam |
Feb |
Fidelis |
The Monju Incident |
Feb |
Context |
Hacking Team and the Targeting of Ethiopian Journalists |
Feb |
The Citizen Lab |
Hacking Team's US Nexus |
Mar |
The Citizen Lab |
Snake Campaign & Cyber Espionage Toolkit |
Mar |
BAE |
Maliciously Repackaged Psiphon Found |
Mar |
The Citizen Lab |
Deep Panda |
May |
Crowdstrike |
Operation Saffron Rose |
May |
FireEye |
Rat In A Jar: A Phishing Campaign Using Unrecom |
May |
Fidelis |
Illuminating The Etumbot Apt Backdoor |
Jun |
Arbor |
Putter Panda |
Jun |
Crowdstrike |
Anatomy Of The Attack: Zombie Zero |
Jun |
Trapx |
Dragonfly: Cyberespionage Attacks Against Energy Suppliers |
Jun |
Symantec |
Police Story: Hacking Team Government Surveillance Malware |
Jun |
The Citizen Lab |
Energetic Bear _ Crouching Yeti |
Jul |
Kaspersky |
The Eye Of The Tiger (Pitty Tiger) |
Jul |
Airbus |
Crouching Yeti: Appendixes |
Jul |
Kaspersky |
Operation Arachnophobia Caught In The Spider's Web |
Aug |
Threat Connect |
Sidewinder Targeted Attack Against Android In The Golden Age Of Ad Libraries |
Aug |
FireEye |
Profiling An Enigma: The Mystery Of North Korea's Cyber Threat Landscape |
Aug |
HP |
The Epic Turla Operation: Solving Some Of The Mysteries Of Snake/Uroboros |
Aug |
Kaspersky |
Syrian Malware, The Ever-Evolving Threat |
Aug |
Kaspersky |
Cosmicduke Cosmu With A Twist Of Miniduke |
Sep |
F-Secure |
Operation Quantum Entanglement |
Sep |
FireEye |
BLACKENERGY & QUEDAGH The convergence of crimeware and APT attacks |
Oct |
F-Secure |
Sofacy Phishing |
Oct |
PWC |
Operation Pawn Storm Using Decoys to Evade Detection |
Oct |
Trend Micro |
Hikit Analysis |
Oct |
Novetta |
Apt28: A Window Into Russia's Cyber Espionage Operations |
Oct |
FireEye |
Micro-Targeted Malvertising Via Real-Time Ad Bidding |
Oct |
Invincea |
The Rotten Tomato Campaign |
Oct |
Sophos |
Zoxpng Analysis |
Oct |
Novetta |
Operation Toohash How Targeted Attacks Work |
Oct |
GDATA |
The Darkhotel Apt A Story Of Unusual Hospitality |
Nov |
Kaspersky |
Darkhotel Indicators Of Compromise |
Nov |
Kaspersky |
Derusbi (Server Variant) Analysis |
Nov |
Novetta |
Evil Bunny: Suspect #4 |
Nov |
Marion |
The Regin Platform Nation-State Ownership Of Gsm Networks |
Nov |
Kaspersky |
Regin: Top-Tier Espionage Tool Enables Stealthy Surveillance |
Nov |
Symantec |
Anunak: Apt Against Financial Institutions |
Dec |
FoxIT |
The Inception Framework: Cloud-Hosted Apt |
Dec |
Blue Coat |
Operation Cleaver |
Dec |
Cylance |
Bots, Machines, And The Matrix |
Dec |
Fidelis |
Hacking The Street? Fin4 Likely Playing The Market |
Dec |
FireEye |
W32/Regin, Stage #1 |
Dec |
F-Secure |
W64/Regin, Stage #1 |
Dec |
F-Secure |
Malware Attacks Targeting Syrian ISIS Critics |
Dec |
The Citizen Lab |