Semantic search

Jump to navigation Jump to search
 AuthorEditorBotnet
Bot herders build newer versions of previous botnet WaledacSPAMfighterVirut
Waledac
CVE-2013-1493 (jre17u15 - jre16u41) integrating exploit kitsKafeineKafeineUrausy
CVE-2013-2465/CVE-2013-2471/CVE-2013-2463 integrating Exploit Kits -- jre7u21 CVE- jre6u45 and earlierKafeineMalware don't need cofee
Carberp-based trojan attacking SAPGeoff McDonaldMicrosoft Malware Protection CentreCarberp
Gamker
Chameleon botnet grabbed $6m A MONTH from online ad-slingersJohn LeydenChameleon
Citadel plitfi botnet reportCERT PolskaCitadel
Collateral damage: Microsoft hits security researchers along with CitadelAbuse.chCitadel
Cross-platform Frutas RAT builder and back doorJoseph BinghamSymantecFrutas
Demystifying PobelkaMichael SandeeFox-ITSpyEye
Citadel
Pobelka
Department of Labor strategic web compromiseMatt DahlCrowdstrikePoison Ivy
Detecting extended attributes (ZeroAccess) and other Frankenstein’s monsters with HMFTHexacornZeroAccess
Discovered: botnet costing display advertisers over six million dollars per monthSpider.ioChameleon
File infector Expiro hits US, steals FTP credentialsRhena InocencioTrend MicroExpiro
First widespread virus cross-infectionJeet MorpariaSymantecExpiro
Five charged in largest hacking scheme ever prosecuted in USRyan NaraineSecurityWeek
Going solo: self-propagating ZBOT malware spottedAbigail Pichel
Joie Salvio
Alvin Bacani
Trend MicroZeuS
Got malware? Rent an exploit serviceKevin StevensDamballa
Hello Neutrino ! (just one more Exploit Kit)KafeineKafeine
Hesperbot – A new, advanced banking trojan in the wildRobert Lipovsky
Anton Cherepanov
ESETHesperbot
Hiding in plain sight: the FAKEM remote access trojanNart VilleneuveTrend MicroFakeM
Infamous Skynet botnet author allegedly arrestedMalwareTechMalwareTechSkynet
Inside the world of the Citadel trojanRyan SherstobitoffMcAfeeCitadel
Internet Census 2012, port scanning /0 using insecure embedded devicesCarna BotnetCarna
Kelihos botnet appears again with new variantJay PfoutzSecure ConnexionKelihos
Kelihos is dead… No wait… Long live Kelihos! Again!Phil HayTrustwaveKelihos
Kore exploit kitDarrylKahu Security
Latest Kelihos botnet shut down live at RSA Conference 2013Michael MimosoKaspersky labKelihos
Lifting the lid on the Redkit exploit kit (Part 1)Fraser HowardSophos Labs
Linux/Cdorked.A: New Apache backdoor being used in the wild to serve BlackholePierre-Marc BureauESET
Look what I found: it's a Pony!Anat DavidiTrustwavePony
MDK: the largest mobile botnet in ChinaFlora LiuSymantecMDK
Bmaster
Mac spyware found at Oslo Freedom ForumSean SullivanF-SecureHangOver
Malware evolving to defeat anti-DDoS services like CloudFlare?Alexis Dorais-JoncasESETOutFlare
Mariposa botnet 'mastermind' jailed in SloveniaBBCMariposa
Massive search fraud botnet seized by Microsoft and SymantecSean GallagherCondé NastBamital
Mastermind behind Gozi bank malware charged along with two othersKim ZetterCondé NastGozi
Measuring and detecting malware downloads in live network trafficManos Antonakakis
Babak Rahbarinia
Roberto Perdisci
Kang Li
Phani Vadrevu
ESORICS
Meet "Red Dot exploit toolkit"KafeineMalware don't need cofee
Microsoft and Symantec take down Bamital botnet that hijacks online searchesRichard BoscovichMicrosoftBamital
MinidukeCrySyS LabMiniDuke
Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communicationAleksandr MatrosovESETAvatar
NASK shuts down dangerous Virut botnet domainsCERT PolskaVirut
NetTraveler is back: the 'Red Star' APT returns with new tricksCostin RaiuKaspersky labNetTraveler
New CryptoLocker spreads via removable drivesAbigail PichelTrend MicroCryptoLocker
New Mac malware discovered on attendee computer at anti-surveillance workshopBrian DonohueKaspersky labHangOver
New crimeware attacks LatAm bank usersJorge MieresKaspersky labPiceBOT
VOlk
S.A.P.Z.
Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilitiesDancho DanchevWebroot
Nymaim - obfuscation chroniclesJean-Ian BoutinESETNymaim
OSX Kitmos analysisSteeve BarbeauSteeve BarbeauHangOver
PeerRush: mining for unwanted P2P trafficBabak Rahbarinia
Roberto Perdisci
Andrea Lanzi
Kang Li
Conference on Detection of Intrusions and Malware & Vulnerability Assessment