The following resources can be used to gain more knowledge on topics discussed in this chapter:
- LokiBot: If not stealing, then extorting: https://www.kaspersky.com/blog/lokibot-trojan/20030/
- LokiBot - The first hybrid Android malware: https://www.threatfabric.com/blogs/lokibot_the_first_hybrid_android_malware.html
- 15 Examples of Phishing Emails from 2016-2017: https://www.edts.com/edts-blog/15-examples-of-phishing-emails-from-2016-2017
- WHAT TO DO IF YOU ARE A VICTIM: https://www.ic3.gov/media/2017/170504.aspx#fn3
- Analysis: How Malware Creators Use Spam To Maximize Their Impact: https://heimdalsecurity.com/blog/analysis-how-malware-creators-use-spam-to-maximize-their-impact/
- Zeus Virus: https://usa.kaspersky.com/resource-center/threats/zeus-virus
- Spamming: https://www.bitpipe.com/tlist/Spamming.html
- Triout – Spyware Framework for Android with Extensive Surveillance...