Knowledge (XXG)

DarkHotel

Source 📝

230: 223:"Detailed Analysis - Troj/Tapaoux-AD - Viruses and Spyware - Advanced Network Threat Protection | ATP from Targeted Malware Attacks and Persistent Threats | sophos.com - Threat Center" 366: 303: 846: 866: 2011: 198:
are quickly stolen before attackers erase their tools in hopes of not getting caught in order to keep the high level victims from resetting all of the passwords for their accounts.
452: 422: 532: 1018: 558: 836: 493: 780: 205:
published new research about Inexsmar, another version of the DarkHotel malware, which was used to target political figures instead of business targets.
222: 362: 251: 167:
Targets are aimed primarily at executives in investments and development, government agencies, defense industries, electronic manufacturers and
826: 595: 950: 280: 1364: 831: 1498: 1480: 981: 759: 525: 1504: 1030: 991: 626: 805: 1564: 1510: 1085: 976: 444: 912: 749: 651: 414: 971: 744: 340: 851: 563: 553: 518: 317: 1725: 1115: 902: 841: 800: 698: 1220: 955: 718: 148:. Zetter (2014) explains that the group, dubbed DarkHotel or Tapaoux, has also been actively infecting users through 1909: 1250: 1105: 897: 790: 734: 115: 68: 1390: 1359: 986: 1528: 1095: 1013: 919: 892: 485: 1684: 1348: 821: 754: 600: 140:
to hotel servers, attackers are able to target specific users who are guests at luxury hotels primarily in
1558: 1414: 1245: 907: 1699: 1534: 1318: 682: 195: 126: 255: 1462: 1343: 1055: 764: 713: 708: 1961: 1833: 861: 677: 161: 122: 1971: 1966: 1863: 1492: 1255: 1181: 871: 672: 474:"DarkHotel- a spy campaign in Luxury hotels". IT Var News. Techplus Media Pvt. Ltd. 28 Nov 2014. 276: 1976: 1858: 1828: 1432: 1288: 646: 610: 311: 2006: 2001: 1904: 1756: 1679: 1328: 1265: 1140: 589: 1914: 1889: 1853: 1781: 1694: 1689: 1333: 1125: 1035: 739: 1653: 1648: 1338: 1323: 1313: 1308: 1240: 1215: 1210: 1205: 1150: 605: 149: 137: 92: 47: 133:
of real certificates, to convince victims that prompted software downloads are valid.
1995: 1776: 1235: 1194: 1190: 1186: 168: 145: 111: 1720: 1674: 1474: 1438: 1293: 1283: 1176: 1171: 1166: 1040: 856: 785: 388: 153: 389:"DarkHotel: A Sophisticated New Hacking Attack Targets High-Profile Hotel Guests" 332: 121:
The attacks are specifically targeted at senior company executives, using forged
1956: 1946: 1894: 1802: 1746: 1658: 1607: 1468: 1298: 1025: 656: 202: 157: 1899: 1884: 1812: 1602: 1552: 1456: 1408: 1384: 1372: 1230: 1155: 1145: 1135: 1120: 1080: 1005: 636: 190:
Once attackers are in the victim's computer(s), sensitive information such as
130: 1930: 1807: 1771: 1633: 1450: 1200: 1130: 1070: 631: 191: 33: 363:""DarkHotel" uses bogus crypto certificates to snare Wi-Fi-connected execs" 1838: 1766: 1751: 1570: 1546: 1420: 1402: 1303: 1225: 1060: 1045: 945: 924: 703: 1868: 1741: 1704: 1638: 1617: 1587: 1540: 1522: 1444: 1378: 1160: 1075: 1065: 1050: 510: 99: 95: 102:-spreading campaign that appears to be selectively attacking business 1951: 1843: 1797: 1612: 1426: 1396: 1275: 1260: 1090: 929: 641: 180: 40: 415:"Darkhotel APT Uses Hacking Team Exploit to Target Specific Systems" 1576: 1516: 1486: 795: 184: 176: 172: 103: 1848: 1643: 887: 306:. The Inquirer. Archived from the original on November 10, 2014. 304:"Darkhotel malware is targeting travelling execs via hotel WiFi" 141: 107: 514: 827:
Hollywood Presbyterian Medical Center ransomware incident
333:"DarkHotel hackers targets company bosses in hotel rooms" 445:"'DarkHotel' Hacks Target Business Travelers: Report" 1939: 1923: 1877: 1821: 1790: 1734: 1713: 1667: 1626: 1595: 1586: 1357: 1274: 1104: 1004: 964: 938: 880: 814: 773: 727: 691: 665: 619: 582: 575: 277:"The Darkhotel APT: A Story of Unusual Hospitality" 74: 64: 56: 26: 21: 867:Russian interference in the 2016 U.S. elections 2012:South Korean advanced persistent threat groups 526: 8: 837:Democratic National Committee cyber attacks 156:since 2007 and using those attacks to load 1592: 781:Office of Personnel Management data breach 579: 533: 519: 511: 171:makers. Many victims have been located in 486:"Inexsmar: An unusual DarkHotel campaign" 214: 309: 283:from the original on November 10, 2014 106:visitors through the hotel's in-house 18: 425:from the original on 9 September 2017 279:. Kaspersky Labs. November 10, 2014. 7: 832:Commission on Elections data breach 455:from the original on 12 March 2016 14: 992:Jeff Bezos phone hacking incident 1565:Microarchitectural Data Sampling 801:Ukrainian Power Grid Cyberattack 709:Cyberterrorism attack of June 25 302:Carly Page (November 10, 2014). 164:tools onto infected endpoints. 110:network. It is characterized by 913:2017 Ukraine ransomware attacks 750:2014 JPMorgan Chase data breach 496:from the original on 2021-05-25 369:from the original on 2016-12-23 343:from the original on 2021-08-15 233:from the original on 2021-08-17 745:2014 celebrity nude photo leak 1: 982:Bulgarian revenue agency hack 760:Russian hacker password theft 1116:Bangladesh Black Hat Hackers 592:(publication of 2009 events) 16:Spyware and malware spreader 977:Baltimore ransomware attack 2028: 1251:Tailored Access Operations 898:WannaCry ransomware attack 791:Ashley Madison data breach 735:Anthem medical data breach 652:PlayStation network outage 116:advanced persistent threat 987:WhatsApp snooping scandal 852:Indian Bank data breaches 546: 361:Dan Goodin (2014-11-10). 331:Leo Kelion (2014-11-11). 316:: CS1 maint: unfit URL ( 1529:Speculative Store Bypass 1096:Ukrainian Cyber Alliance 893:2017 Macron e-mail leaks 903:Westminster data breach 822:Bangladesh Bank robbery 765:2014 Yahoo! data breach 755:2014 Sony Pictures hack 714:2013 Yahoo! data breach 699:South Korea cyberattack 601:Operation Olympic Games 596:Australian cyberattacks 32:Trojan:Win32/Tapaoux. ( 1246:Syrian Electronic Army 956:SingHealth data breach 719:Singapore cyberattacks 657:RSA SecurID compromise 1535:Lazy FP state restore 1319:Kristoffer von Hassel 972:Sri Lanka cyberattack 842:Vietnam Airport Hacks 683:Operation High Roller 196:intellectual property 154:Peer-to-Peer networks 1481:Silent Bob is Silent 541:Hacking in the 2010s 451:. 10 November 2014. 129:the underlying weak 123:digital certificates 1415:SS7 vulnerabilities 951:Atlanta cyberattack 920:Equifax data breach 678:Stratfor email leak 627:Canadian government 606:Operation ShadowNet 162:reverse engineering 1864:Petya and NotPetya 1493:ROCA vulnerability 1256:The Shadow Brokers 1182:Iranian Cyber Army 1108:persistent threats 908:Petya and NotPetya 872:2016 Bitfinex hack 847:DCCC cyber attacks 806:SWIFT banking hack 1989: 1988: 1985: 1984: 1977:ZeroAccess botnet 1289:Mustafa Al-Bassam 1056:New World Hackers 1019:associated events 1000: 999: 796:VTech data breach 647:Operation AntiSec 611:Operation Payback 570: 569: 82: 81: 39:Troj/Tapaoux-AD ( 2019: 1593: 1266:Yemen Cyber Army 590:Operation Aurora 580: 549: 548: 535: 528: 521: 512: 505: 504: 502: 501: 490:Bitdefender Labs 482: 476: 475: 471: 465: 464: 462: 460: 441: 435: 434: 432: 430: 413:Kovacs, Eduard. 410: 404: 403: 401: 399: 384: 378: 377: 375: 374: 365:. Ars Technica. 358: 352: 351: 349: 348: 328: 322: 321: 315: 307: 299: 293: 292: 290: 288: 273: 267: 266: 264: 263: 254:. Archived from 252:"Trojan.Tapaoux" 248: 242: 241: 239: 238: 219: 91:) is a targeted 46:Trojan.Tapaoux ( 19: 2027: 2026: 2022: 2021: 2020: 2018: 2017: 2016: 1992: 1991: 1990: 1981: 1935: 1919: 1873: 1817: 1786: 1730: 1709: 1663: 1622: 1582: 1362: 1360:vulnerabilities 1353: 1270: 1163:(confederation) 1126:Charming Kitten 1107: 1100: 1036:Goatse Security 996: 960: 934: 925:Deloitte breach 876: 862:Dyn cyberattack 810: 769: 740:Operation Tovar 723: 687: 661: 615: 576:Major incidents 571: 542: 539: 509: 508: 499: 497: 484: 483: 479: 473: 472: 468: 458: 456: 443: 442: 438: 428: 426: 412: 411: 407: 397: 395: 386: 385: 381: 372: 370: 360: 359: 355: 346: 344: 330: 329: 325: 308: 301: 300: 296: 286: 284: 275: 274: 270: 261: 259: 250: 249: 245: 236: 234: 221: 220: 216: 211: 125:, generated by 17: 12: 11: 5: 2025: 2023: 2015: 2014: 2009: 2004: 1994: 1993: 1987: 1986: 1983: 1982: 1980: 1979: 1974: 1969: 1964: 1959: 1954: 1949: 1943: 1941: 1937: 1936: 1934: 1933: 1927: 1925: 1921: 1920: 1918: 1917: 1912: 1907: 1902: 1897: 1892: 1887: 1881: 1879: 1875: 1874: 1872: 1871: 1866: 1861: 1856: 1851: 1846: 1841: 1836: 1831: 1825: 1823: 1819: 1818: 1816: 1815: 1810: 1805: 1800: 1794: 1792: 1788: 1787: 1785: 1784: 1779: 1774: 1769: 1764: 1759: 1754: 1749: 1747:Black Energy 3 1744: 1738: 1736: 1732: 1731: 1729: 1728: 1723: 1717: 1715: 1711: 1710: 1708: 1707: 1702: 1697: 1692: 1687: 1682: 1677: 1671: 1669: 1665: 1664: 1662: 1661: 1656: 1654:Metulji botnet 1651: 1646: 1641: 1636: 1630: 1628: 1624: 1623: 1621: 1620: 1615: 1610: 1608:Black Energy 2 1605: 1599: 1597: 1590: 1584: 1583: 1581: 1580: 1574: 1568: 1562: 1556: 1550: 1544: 1538: 1532: 1526: 1520: 1514: 1508: 1502: 1496: 1490: 1484: 1478: 1472: 1466: 1463:Broadcom Wi-Fi 1460: 1454: 1448: 1442: 1436: 1430: 1424: 1418: 1412: 1406: 1400: 1394: 1388: 1382: 1376: 1369: 1367: 1355: 1354: 1352: 1351: 1346: 1341: 1336: 1331: 1326: 1324:Junaid Hussain 1321: 1316: 1314:Jeremy Hammond 1311: 1309:Elliott Gunton 1306: 1301: 1296: 1291: 1286: 1280: 1278: 1272: 1271: 1269: 1268: 1263: 1258: 1253: 1248: 1243: 1241:Stealth Falcon 1238: 1233: 1228: 1223: 1218: 1216:PLA Unit 61486 1213: 1211:PLA Unit 61398 1208: 1206:Numbered Panda 1203: 1198: 1184: 1179: 1174: 1169: 1164: 1158: 1153: 1151:Equation Group 1148: 1143: 1138: 1133: 1128: 1123: 1118: 1112: 1110: 1102: 1101: 1099: 1098: 1093: 1088: 1083: 1078: 1073: 1068: 1063: 1058: 1053: 1048: 1043: 1038: 1033: 1028: 1023: 1022: 1021: 1010: 1008: 1002: 1001: 998: 997: 995: 994: 989: 984: 979: 974: 968: 966: 962: 961: 959: 958: 953: 948: 942: 940: 936: 935: 933: 932: 927: 922: 917: 916: 915: 905: 900: 895: 890: 884: 882: 878: 877: 875: 874: 869: 864: 859: 854: 849: 844: 839: 834: 829: 824: 818: 816: 812: 811: 809: 808: 803: 798: 793: 788: 783: 777: 775: 771: 770: 768: 767: 762: 757: 752: 747: 742: 737: 731: 729: 725: 724: 722: 721: 716: 711: 706: 701: 695: 693: 689: 688: 686: 685: 680: 675: 669: 667: 663: 662: 660: 659: 654: 649: 644: 642:HBGary Federal 639: 634: 629: 623: 621: 617: 616: 614: 613: 608: 603: 598: 593: 586: 584: 577: 573: 572: 568: 567: 561: 556: 547: 544: 543: 540: 538: 537: 530: 523: 515: 507: 506: 477: 466: 436: 405: 379: 353: 323: 294: 268: 243: 227:www.sophos.com 213: 212: 210: 207: 150:spear-phishing 138:malicious code 93:spear-phishing 80: 79: 76: 72: 71: 66: 62: 61: 58: 54: 53: 52: 51: 44: 37: 28: 27:Technical name 24: 23: 15: 13: 10: 9: 6: 4: 3: 2: 2024: 2013: 2010: 2008: 2005: 2003: 2000: 1999: 1997: 1978: 1975: 1973: 1970: 1968: 1965: 1963: 1960: 1958: 1955: 1953: 1950: 1948: 1945: 1944: 1942: 1938: 1932: 1929: 1928: 1926: 1922: 1916: 1913: 1911: 1908: 1906: 1903: 1901: 1898: 1896: 1893: 1891: 1888: 1886: 1883: 1882: 1880: 1876: 1870: 1867: 1865: 1862: 1860: 1857: 1855: 1852: 1850: 1847: 1845: 1842: 1840: 1837: 1835: 1832: 1830: 1827: 1826: 1824: 1820: 1814: 1811: 1809: 1806: 1804: 1801: 1799: 1796: 1795: 1793: 1789: 1783: 1780: 1778: 1777:Gameover ZeuS 1775: 1773: 1770: 1768: 1765: 1763: 1760: 1758: 1755: 1753: 1750: 1748: 1745: 1743: 1740: 1739: 1737: 1733: 1727: 1724: 1722: 1719: 1718: 1716: 1712: 1706: 1703: 1701: 1698: 1696: 1693: 1691: 1688: 1686: 1683: 1681: 1678: 1676: 1673: 1672: 1670: 1666: 1660: 1657: 1655: 1652: 1650: 1647: 1645: 1642: 1640: 1637: 1635: 1632: 1631: 1629: 1625: 1619: 1616: 1614: 1611: 1609: 1606: 1604: 1601: 1600: 1598: 1594: 1591: 1589: 1585: 1578: 1575: 1572: 1569: 1566: 1563: 1560: 1557: 1554: 1551: 1548: 1545: 1542: 1539: 1536: 1533: 1530: 1527: 1524: 1521: 1518: 1515: 1512: 1509: 1506: 1503: 1500: 1497: 1494: 1491: 1488: 1485: 1482: 1479: 1476: 1473: 1470: 1467: 1464: 1461: 1458: 1455: 1452: 1449: 1446: 1443: 1440: 1437: 1434: 1431: 1428: 1425: 1422: 1419: 1416: 1413: 1410: 1407: 1404: 1401: 1398: 1395: 1392: 1389: 1386: 1383: 1380: 1377: 1374: 1371: 1370: 1368: 1366: 1361: 1356: 1350: 1347: 1345: 1342: 1340: 1337: 1335: 1332: 1330: 1327: 1325: 1322: 1320: 1317: 1315: 1312: 1310: 1307: 1305: 1302: 1300: 1297: 1295: 1292: 1290: 1287: 1285: 1282: 1281: 1279: 1277: 1273: 1267: 1264: 1262: 1259: 1257: 1254: 1252: 1249: 1247: 1244: 1242: 1239: 1237: 1236:Rocket Kitten 1234: 1232: 1229: 1227: 1224: 1222: 1219: 1217: 1214: 1212: 1209: 1207: 1204: 1202: 1199: 1196: 1192: 1188: 1187:Lazarus Group 1185: 1183: 1180: 1178: 1175: 1173: 1170: 1168: 1165: 1162: 1159: 1157: 1154: 1152: 1149: 1147: 1144: 1142: 1139: 1137: 1134: 1132: 1129: 1127: 1124: 1122: 1119: 1117: 1114: 1113: 1111: 1109: 1103: 1097: 1094: 1092: 1089: 1087: 1084: 1082: 1079: 1077: 1074: 1072: 1069: 1067: 1064: 1062: 1059: 1057: 1054: 1052: 1049: 1047: 1044: 1042: 1039: 1037: 1034: 1032: 1029: 1027: 1024: 1020: 1017: 1016: 1015: 1012: 1011: 1009: 1007: 1003: 993: 990: 988: 985: 983: 980: 978: 975: 973: 970: 969: 967: 963: 957: 954: 952: 949: 947: 944: 943: 941: 937: 931: 930:Disqus breach 928: 926: 923: 921: 918: 914: 911: 910: 909: 906: 904: 901: 899: 896: 894: 891: 889: 886: 885: 883: 879: 873: 870: 868: 865: 863: 860: 858: 855: 853: 850: 848: 845: 843: 840: 838: 835: 833: 830: 828: 825: 823: 820: 819: 817: 813: 807: 804: 802: 799: 797: 794: 792: 789: 787: 784: 782: 779: 778: 776: 772: 766: 763: 761: 758: 756: 753: 751: 748: 746: 743: 741: 738: 736: 733: 732: 730: 726: 720: 717: 715: 712: 710: 707: 705: 704:Snapchat hack 702: 700: 697: 696: 694: 690: 684: 681: 679: 676: 674: 673:LinkedIn hack 671: 670: 668: 664: 658: 655: 653: 650: 648: 645: 643: 640: 638: 635: 633: 630: 628: 625: 624: 622: 618: 612: 609: 607: 604: 602: 599: 597: 594: 591: 588: 587: 585: 581: 578: 574: 566: → 565: 562: 560: 557: 555: 552:←  551: 550: 545: 536: 531: 529: 524: 522: 517: 516: 513: 495: 491: 487: 481: 478: 470: 467: 454: 450: 446: 440: 437: 424: 420: 419:Security Week 416: 409: 406: 394: 390: 387:Zetter, Kim. 383: 380: 368: 364: 357: 354: 342: 338: 334: 327: 324: 319: 313: 305: 298: 295: 282: 278: 272: 269: 258:on 2019-12-14 257: 253: 247: 244: 232: 228: 224: 218: 215: 208: 206: 204: 201:In July 2017 199: 197: 193: 188: 186: 182: 178: 174: 170: 169:energy policy 165: 163: 159: 155: 151: 147: 146:United States 143: 139: 134: 132: 128: 124: 119: 117: 113: 112:Kaspersky Lab 109: 105: 101: 97: 94: 90: 86: 77: 73: 70: 67: 63: 59: 55: 49: 45: 42: 38: 35: 31: 30: 29: 25: 20: 1761: 1721:CryptoLocker 1475:DoublePulsar 1294:Cyber Anakin 1284:Ryan Ackroyd 1177:Helix Kitten 1172:Hacking Team 1167:Guccifer 2.0 1041:Lizard Squad 857:Surkov leaks 786:Hacking Team 498:. Retrieved 489: 480: 469: 457:. Retrieved 448: 439: 427:. Retrieved 418: 408: 396:. Retrieved 392: 382: 371:. Retrieved 356: 345:. Retrieved 336: 326: 297: 287:November 10, 285:. Retrieved 271: 260:. Retrieved 256:the original 246: 235:. Retrieved 226: 217: 200: 189: 166: 135: 120: 88: 84: 83: 1957:NetTraveler 1895:LogicLocker 1803:Hidden Tear 1700:Red October 1559:Dragonblood 1469:EternalBlue 1433:Stagefright 1299:George Hotz 1276:Individuals 1026:CyberBerkut 203:Bitdefender 158:key logging 131:public keys 78:South Korea 1996:Categories 1900:Rensenware 1885:BrickerBot 1813:TeslaCrypt 1603:Bad Rabbit 1553:Foreshadow 1457:Cloudbleed 1409:Row hammer 1391:Shellshock 1385:Heartbleed 1373:Evercookie 1349:The Jester 1231:Red Apollo 1191:BlueNorOff 1161:GOSSIPGIRL 1156:Fancy Bear 1146:Elfin Team 1141:DarkMatter 1136:Dark Basin 1121:Bureau 121 1081:Teamp0ison 1006:Hacktivism 637:DNSChanger 500:2021-10-22 373:2017-06-14 347:2021-10-22 262:2021-10-22 237:2021-10-22 209:References 136:Uploading 1931:VPNFilter 1808:Rombertik 1772:FinFisher 1762:DarkHotel 1726:DarkSeoul 1634:Coreflood 1499:BlueBorne 1451:Dirty COW 1365:disclosed 1363:publicly 1201:NSO Group 1131:Cozy Bear 1071:PayPal 14 1014:Anonymous 888:SHAttered 632:DigiNotar 192:passwords 127:factoring 89:Darkhotel 85:DarkHotel 34:Microsoft 22:DarkHotel 1972:Titanium 1915:XafeCopy 1910:WannaCry 1839:KeRanger 1767:Duqu 2.0 1752:Carbanak 1571:BlueKeep 1547:SigSpoof 1505:Meltdown 1421:WinShock 1403:Rootpipe 1304:Guccifer 1226:Pranknet 1221:PLATINUM 1195:AndAriel 1106:Advanced 1061:NullCrew 1046:LulzRaft 946:Trustico 559:Timeline 494:Archived 453:Archived 449:NBC News 423:Archived 367:Archived 341:Archived 337:BBC News 312:cite web 281:Archived 231:Archived 144:and the 48:Symantec 2007:Malware 2002:Spyware 1869:X-Agent 1859:Pegasus 1742:Brambul 1705:Shamoon 1649:Kelihos 1639:Alureon 1618:Stuxnet 1588:Malware 1541:TLBleed 1523:Exactis 1511:Spectre 1445:Badlock 1379:iSeeYou 1344:Topiary 1076:RedHack 1066:OurMine 1051:LulzSec 459:12 June 429:12 June 100:malware 96:spyware 60:Tapaoux 1952:Joanap 1905:Triton 1844:Necurs 1834:Jigsaw 1829:Hitler 1798:Dridex 1757:Careto 1680:Dexter 1613:SpyEye 1579:(2019) 1573:(2019) 1567:(2019) 1561:(2019) 1555:(2018) 1549:(2018) 1543:(2018) 1537:(2018) 1531:(2018) 1525:(2018) 1519:(2018) 1513:(2018) 1507:(2018) 1501:(2017) 1495:(2017) 1489:(2017) 1483:(2017) 1477:(2017) 1471:(2017) 1465:(2017) 1459:(2017) 1453:(2016) 1447:(2016) 1441:(2016) 1435:(2015) 1429:(2015) 1427:JASBUG 1423:(2014) 1417:(2014) 1411:(2014) 1405:(2014) 1399:(2014) 1397:POODLE 1393:(2014) 1387:(2014) 1381:(2013) 1375:(2010) 1358:Major 1339:Track2 1261:xDedic 1091:UGNazi 398:6 June 181:Russia 114:as an 75:Origin 41:Sophos 1967:Tinba 1854:Mirai 1782:Regin 1695:Mahdi 1690:Flame 1675:Carna 1659:Stars 1577:Kr00k 1517:EFAIL 1487:KRACK 1439:DROWN 564:2020s 554:2000s 393:Wired 185:Japan 177:China 173:Korea 104:hotel 57:Alias 1962:R2D2 1947:Grum 1940:2019 1924:2018 1890:Kirk 1878:2017 1849:MEMZ 1822:2016 1791:2015 1735:2014 1714:2013 1668:2012 1644:Duqu 1627:2011 1596:2010 1334:Sabu 1086:TDO 1031:GNAA 965:2019 939:2018 881:2017 815:2016 774:2015 728:2014 692:2013 666:2012 620:2011 583:2010 461:2017 431:2017 400:2017 318:link 289:2014 194:and 183:and 160:and 152:and 142:Asia 108:WiFi 98:and 87:(or 65:Type 1685:FBI 1329:MLT 1193:) ( 187:. 69:APT 1998:: 492:. 488:. 447:. 421:. 417:. 391:. 339:. 335:. 314:}} 310:{{ 229:. 225:. 179:, 175:, 118:. 1197:) 1189:( 534:e 527:t 520:v 503:. 463:. 433:. 402:. 376:. 350:. 320:) 291:. 265:. 240:. 50:) 43:) 36:)

Index

Microsoft
Sophos
Symantec
APT
spear-phishing
spyware
malware
hotel
WiFi
Kaspersky Lab
advanced persistent threat
digital certificates
factoring
public keys
malicious code
Asia
United States
spear-phishing
Peer-to-Peer networks
key logging
reverse engineering
energy policy
Korea
China
Russia
Japan
passwords
intellectual property
Bitdefender
"Detailed Analysis - Troj/Tapaoux-AD - Viruses and Spyware - Advanced Network Threat Protection | ATP from Targeted Malware Attacks and Persistent Threats | sophos.com - Threat Center"

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.