Published | Family | Author - Title |
2017-06-27 12:06 | plugx | Tom Lancaster / Palo Alto Networks - Paranoid PlugX |
2017-06-06 09:06 | plugx | Bill Gertz / Washington Free Beacon - Security Analysts Confirm Links Between Beijing Spy Agency and Security Firm |
2017-05-08 12:05 | plugx | xdxdxdxdoa / Twitter - 861564329983954946 |
2017-04-28 06:04 | plugx | cyb3rops / Twitter - 857843012990377985 |
2017-04-14 17:04 | plugx | Black Hat USA 2017 |
2017-04-06 22:04 | plugx | malwareunicorn / Twitter - 850109628847280128 |
2017-03-22 13:03 | plugx | Cedric Pernet (Threat Researcher) - Winnti Abuses GitHub for C&C Communications - TrendLabs Security Intelligence Blog |
2017-02-21 00:02 | plugx | JPCERT/CC Blog - PlugX + Poison Ivy = PlugIvy? - PlugX Integrating Poison Ivy’s Code |
2016-09-04 12:09 | plugx | CIRCL » TR-24 Analysis - Destory RAT family |
2016-06-22 08:06 | plugx | Fabien Perigaud / Airbus D&S CyberSecurity blog - Getting a PlugX builder |
2016-06-17 00:06 | plugx | Mynavi Corporation / マイナビニュース - 「PlugX」はどんなマルウェア? JTBを狙った標的型攻撃をファイア・アイが解説 |
2016-05-10 17:05 | plugx | Maleware_Fake-Scandal-1.pdf |
2016-04-14 11:04 | plugx | Malware > Trojan.Win32.Korplug | Threatcrowd.org Open Source Threat Intelligence |
2016-04-14 11:04 | plugx | index.php?title=Trojan_moves_its_configuration_to_Twitter,_LinkedIn,_MSDN_and_Baidu |
2016-04-14 11:04 | plugx | Win32/Korplug.A | ESET Virusradar |
2016-04-14 11:04 | plugx | Win32/Korplug.AP | ESET Virusradar |
2016-04-14 11:04 | plugx | -
國家資通安全科技中心 |
2016-04-14 11:04 | plugx | Roman Vasilenko / HubSpot - An Analysis of PlugX Malware |
2016-04-14 11:04 | plugx | 第3回:巧妙な隠蔽技法を備えた標的型攻撃用ツール「BKDR_PLUGX」 - 最新ウイルス解析レポー...:ITpro Active |
2016-04-14 11:04 | plugx | Sign In / Washington Post - Officials: Chinese had access to U.S. security clearance data for one year |
2016-04-14 11:04 | plugx | SecureWorks Counter Threat Unit Threat Intelligence - Threat Group-3390 Targets Organizations for Cyberespionage |
2016-04-14 11:04 | plugx | prezi.com - PlugX: The Memory Forensics Lifecycle |
2016-04-14 11:04 | plugx | Backdoor.Surge Technical Details | Symantec |
2016-04-14 11:04 | plugx | Asian cyber-spies fling Seven Pointed Dagger against Myanmar, NGOs |
2016-04-14 11:04 | plugx | PlugX APT Malware | RSA Link |
2016-04-14 11:04 | plugx | Отчет об исследовании вредоносного RTF файла - Статьи «KZ-CERT» — Служба реагирования на компьютерные инциденты |
2016-04-14 11:04 | plugx | KZ-CERT зиянды объектілерді талдауды жалғастыруда - Жаңалықтар «KZ-CERT» — Компьютерлік инциденттерге әрекет ету қызметі |
2016-04-14 00:04 | plugx | The connection between the Plugx Chinese gang and the latest Internet Explorer Zeroday |
2016-04-09 12:04 | plugx | Malware Plugx Kaba - Jul Ismail |
2016-04-05 06:04 | plugx | https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-dll-sideloading.pdf |
2016-03-30 14:03 | plugx | Carbon Black - Blog |
2016-03-10 10:03 | plugx | Dmitry Tarakanov / Kaspersky - A good hacker is an apologetic hacker |
2016-03-03 09:03 | plugx | Dark Reading - IE Bug Exploited In Wild After Microsoft Releases Out-Of-Band Patch |
2015-12-22 17:12 | plugx | Bryan Lee,Josh Grunzweig / Palo Alto Networks - BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger |
2015-12-21 13:12 | plugx | ASERT-Threat-Intelligence-Brief-2015-08-Uncovering-the-Seven-Pointed-Dagger.pdf |
2015-12-04 06:12 | plugx | Takahiro Haruyama (@cci_forensics) - PlugX Builder/Controller (Type III, 0x840) - CCI |
2015-12-04 06:12 | plugx | Takahiro Haruyama (@cci_forensics) - ID/IDAPython scripts extracting PlugX configs - CCI |
2015-11-24 17:11 | plugx | Robert Falcone,Mike Scott,Juan Cortes / Palo Alto Networks - Attack Campaign on the Government of Thailand Delivers Bookworm Trojan |
2015-11-06 16:11 | plugx | PlugX: Memory Forensics Lifecycle with Volatility |
2015-10-30 20:10 | plugx | Dmitry Tarakanov / Kaspersky - Securelist | PlugX is Becoming Mature |
2015-10-28 16:10 | plugx | Charles Rami - Le cheval de Troie PlugX à l'assaut de l'armée et des télécommunications en Russie |
2015-10-26 14:10 | plugx | BfV-Cyber-Brief_01_2015.pdf |
2015-10-16 04:10 | plugx | Katie Kleemola / The Citizen Lab - Targeted Malware Attacks against NGO Linked to Attacks on Burmese Government Websites |
2015-10-16 00:10 | plugx | The Citizen Lab - Targeted Malware Attacks against NGO Linked to Attacks on Burmese Government Websites |
2015-10-08 00:10 | plugx | Sarah Silvestriadis - PlugX malware is highly customizable for hackers to pick up – bad news for confidential data | Wapack Labs |
2015-09-15 21:09 | plugx | Proofpoint - In Pursuit of Optical Fibers and Troop Intel: Targeted Attack Distributes PlugX in Russia |
2015-09-13 00:09 | plugx | Christian - Using threat_note To Track Campaigns: Returning to PIVY and PlugX Infrastructure – CYINT Analysis |
2015-08-24 17:08 | plugx | Arbor Networks - ASERT Threat Intelligence Brief 2015-05 PlugX Threat Activity in Myanmar |
2015-08-19 10:08 | plugx | Heimdal Security Blog - Security Alert: Millions Exposed to Cyber Attacks Because of Internet Explorer Vulnerability |
2015-08-19 00:08 | plugx | Symantec Security Response - New Internet Explorer zero-day exploited in Hong Kong attacks |
2015-08-08 00:08 | plugx | Christian - Threat Analysis: Poison Ivy and Links to an Extended PlugX Campaign – CYINT Analysis |
2015-08-06 07:08 | plugx | Fabien Perigaud / Airbus D&S CyberSecurity blog - Latest changes in PlugX |
2015-08-03 11:08 | plugx | Arbor Threat Intelligence - Automating Intelligence: Discovering Recent PlugX Campaigns Programmatically |
2015-07-31 19:07 | plugx | KMEROLLA / OTX - FBI Flash #68 (PlugX) |
2015-07-30 00:07 | plugx | Sudeep Singh,Kenneth Hsu / FireEye - CVE-2015-0097 Exploited in the Wild |
2015-06-15 12:06 | plugx | The Citizen Lab - Targeted Attacks against Tibetan and Hong Kong Groups Exploiting CVE-2014-4114 |
2015-05-28 19:05 | plugx | Asia-14-Haruyama-I-Know-You-Want-Me-Unplugging-PlugX.pdf |
2015-05-23 07:05 | plugx | tr-12-circl-plugx-analysis-v1.pdf |
2015-05-01 13:05 | plugx | Robert Falcone / Palo Alto Networks - PlugX Uses Legitimate Samsung Application for DLL Side-Loading |
2015-03-02 00:03 | plugx | Brian Prince - PlugX Malware Adopts New Tactic in India Attack Campaign | SecurityWeek.Com |
2015-02-25 11:02 | plugx | plugx-goes-to-the-registry-and-india.pdf |
2015-02-25 00:02 | plugx | John Zorabedian - Rotten Tomato | Sophos Blog |
2015-02-25 00:02 | plugx | John Zorabedian - SophosLabs research uncovers new developments in PlugX APT malware | Sophos Blog |
2015-02-10 14:02 | plugx | Michael Mimoso / Threatpost | The first stop for security news - PlugX, Go-To Malware for Targeted Attacks, More Prominent Than Ever |
2015-02-09 00:02 | plugx | John Zorabedian - Microsoft Word Intruder revealed: New SophosLabs research goes inside a malware creation kit | Sophos Blog |
2015-01-29 09:01 | plugx | JPCERT/CC Blog : Analysis of a Recent PlugX Variant - “P2P PlugX” |
2015-01-29 00:01 | plugx | JPCERT/CC Blog - Analysis of a Recent PlugX Variant - “P2P PlugX” |
2015-01-29 00:01 | plugx | JPCERT/CC Blog - Analysis of a Recent PlugX Variant - “P2P PlugX” |
2015-01-22 00:01 | plugx | JPCERT/CC - マルウエアPlugXの新機能 (2015-01-22) |
2015-01-19 20:01 | plugx | Benson Sy (Threats Analyst) / TrendLabs Security Intelligence Blog - PlugX Malware Found in Official Releases of League of Legends, Path of Exile |
2014-11-12 15:11 | plugx | Robert Lipovsky / We Live Security - Korplug military targeted attacks: Afghanistan & Tajikistan |
2014-10-30 15:10 | plugx | sophos-rotten-tomato-campaign.pdf |
2014-10-30 00:10 | plugx | John Zorabedian - The Rotten Tomato Campaign: New SophosLabs research on APTs | Sophos Blog |
2014-09-01 00:09 | plugx | admin - Watching Attackers Through Virustotal | 9b+ |
2014-07-24 00:07 | plugx | Geok Meng Ong,Chong Rong Hwa / FireEye - Pacific Ring of Fire: PlugX / Kaba |
2014-06-30 15:06 | plugx | swank / Naked Security - From the Labs: PlugX – the next generation |
2014-06-27 18:06 | plugx | plugx-thenextgeneration.pdf |
2014-03-05 21:03 | plugx | Lucian Constantin / PCWorld - IE exploit distributes PlugX malware, researchers say |
2014-02-07 00:02 | plugx | John Zorabedian - The next generation of the PlugX APT – new SophosLabs research | Sophos Blog |
2014-01-29 14:01 | plugx | Fabien Perigaud / Airbus D&S CyberSecurity blog - PlugX "v2": meet "SController" |
2014-01-06 09:01 | plugx | Fabien Perigaud / Airbus D&S CyberSecurity blog - PlugX: some uncovered points |
2013-12-20 00:12 | plugx | AhnLab / AhnLab - Threat Report - ETSO APT Attacks Analysis |
2013-11-14 16:11 | plugx | Scurit - The rush for CVE-2013-3906 - a hot commodity |
2013-11-14 16:11 | plugx | Dmitry Tarakanov / Kaspersky - Securelist | The rush for CVE-2013-3906 - a Hot Commodity |
2013-11-12 00:11 | plugx | Nart Villeneuve,Mike Scott / FireEye - Exploit Proliferation: Additional Threat Groups Acquire CVE-2013-3906 |
2013-08-07 18:08 | plugx | spider / UNWIRE.HK 流動科技生活 - 別更新!新版 KMPlayer 隨時令你被入侵 - UNWIRE.HK |
2013-06-03 06:06 | plugx | sophosszappanosplugxmalwarefactoryversion6-rev3.pdf |
2013-05-20 13:05 | plugx | Nate / Naked Security - Inside the “PlugX” malware with SophosLabs – a fascinating journey into a malware factory… |
2013-05-14 00:05 | plugx | Amanda Stewart / FireEye - Targeted Attack Trend Alert: PlugX the Old Dog With a New Trick |
2013-05-12 00:05 | plugx | John Zorabedian - SophosLabs researchers dissect PlugX Trojan targeting users in Japan | Sophos Blog |
2013-04-24 19:04 | plugx | Roddell Santos (Threats Analyst) / TrendLabs Security Intelligence Blog - New Wave of PlugX Targets Legitimate Apps |
2013-03-29 10:03 | plugx | tr-12-circl-plugx-analysis-v1.pdf |
2013-03-28 00:03 | plugx | CIRCL » TR-12 - Analysis of a PlugX malware variant used for targeted attacks |
2013-03-26 16:03 | plugx | PlugX_-_Payload_Extraction_March_2013_1.pdf |
2013-03-15 00:03 | plugx | Kevin O’Reilly / Contextis - PlugX - Payload Extraction |
2013-02-27 09:02 | plugx | NIgel / Naked Security - Targeted malware attack piggybacks on Nvidia digital signature |
2012-09-17 19:09 | plugx | Abraham Camba (Threat Researcher) / TrendLabs Security Intelligence Blog - Unplugging PlugX Capabilities |
2012-09-14 14:09 | plugx | Max Smolaks / TechWeekEurope UK - PlugX RAT Malware Was Created By An IT Executive |
2012-09-13 00:09 | plugx | Jaime Blasco / AlienVault - Tracking down the author of the PlugX RAT |
2012-09-10 17:09 | plugx | Roland Dela Paz (Threat Researcher) / TrendLabs Security Intelligence Blog - PlugX: New Tool For a Not So New Campaign |
2012-08-09 00:08 | plugx | Symantec Security Response - New Sample of Backdoor.Korplug is Signed with a Stolen Certificate |
2012-04-02 00:04 | plugx | Google Docs - Plugx Development Testing |
2012-02-10 01:02 | plugx | CommandFive - Command and Control in the Fifth Domain |