From Botnets.fr
Jump to navigation
Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
(Year/Month)
Description
Botnets
- Starting in 2009: Adrenalin, Bredolab, Donbot, Duqu, Grups, Gumblar, Mehika, NetTraveler, Simda, Sninfs, Travnet, Waledac, Whitewell
- Ending in 2009: Mariposa
Publications
| Author | Editor | Botnet | Campaign |
---|
'Tigger' trojan keeps security researchers hopping | Tim Wilson | UBM TechWeb | Tigger | |
A Foray into Conficker’s Logic and Rendezvous Points | | LEET'09 Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more | Conficker | |
A study of the Ilomo / Clampi botnet | Alice Decker Max Goncharov Robert McArdle David Sancho | Trend Micro | Clampi | |
Adrenalin botnet. The trend marks the Russian crimeware | Jorge Mieres | Evilfingers | Adrenalin | |
An Analysis of the iKeeB (duh) iPhone botnet (Worm) | Philip Porras Hassen Saidi Vinod Yegneswaran | SRI International | | |
Botnet: classification, attacks, detection, tracing, and preventive measures | Jing Liu Yang Xiao Hongmei Deng Jingyuan Zhang | EURASIP Journal on Wireless Communications and Networking | Agobot Phatbot Forbot XtremBot SDBot SpyBot Netdevil UrBot RBot UrXBot | |
Cimbot - A technical analysis | Julia Wolf | FireEye | Cimbot | |
Clampi/Ligats/Ilomo trojan | Joe Stewart | DELL SecureWorks | Clampi | |
Detection and classification of different botnet C&C channels | Gregory Fedynyshyn Mooi Choo Chuah Gang Tan | Lehigh University. Bethlehem | Agobot Bobax Rustock Storm Waledac Ircbot UDP Storm | |
Google Groups trojan | Gavin O’Gorman | Symantec | Grups | |
Gumblar Google-poisoning attack morphs | John Leyden | The Register | Gumblar | |
How to steal a Botnet and what can happen when you do | Richard Kemmerer | Google | Torpig | |
Hébergeurs malhonnêtes : nouvelle fermeture (3FN) | Eric Freyssinet | Criminalités numériques | | 3FN McColo |
Maazben: best of both worlds | Rodel Mendrez | M86 Security labs | Maazben | |
OSX.Iservice technical details | Elia Florio | Symantec | IBotnet | |
OSX.iService its not going to iWork for you | Ben Nahorney | Symantec | IBotnet | |
Russian service online to check the detection of malware | Jorge Mieres | Malware Intelligence | | |
SDBot IRC botnet continues to make waves | Loucif Kharouni | Trend Micro | SDBot | |
Stealthy router-based botnet worm squirming | Ryan Naraine | ZDNet | Psybot | |
The Waledac protocol: the how and why | Chris Nunnery Brent ByungHoon Kang Greg Sinclair | Malicious and Unwanted Software (MALWARE) | Waledac | |
The growing threat to business banking online | Brian Krebs | Washington Post | Clampi | |
The tigger trojan: icky, sticky stuff | Brian Krebs | Washington Post | Tigger | |
Trojan.Whitewell: what’s your (bot) Facebook status today? | Andrea Lelli | Symantec | Whitewell | |
Trusteer warns of new two headed trojan attack against online banks | Press release | Trusteer | Silon | |
Twitter + Pastebin = malware update | Patrick Fitzgerald | Symantec | Sninfs | |
Un WOMBAT pour évaluer la cybercriminalité | Corrado Leita Marc Dacier V.H. Pham Olivier Thonnard E. Kirda | SSTIC | | |
Virus scanners for virus authors | Brian Krebs | Krebs on Security | | |
Waledac Botnet - Deployment and Communication Analysis | Kyle Yang Derek Manky | Fortinet | Waledac | |
Xarvester, the new Srizbi? | Gavin Neale | M86 Security Labs | Xarvester | |
Your botnet is my botnet: analysis of a botnet takeover | Brett Stone-Gross Christopher Kruegel Giovanni Vigna Marco Cova Lorenzo Cavallaro Bob Gilbert Martin Szydlowski Richard A Kemmerer | Department of Computer Science, University of California, Santa Barbara | Torpig | |