Category:Publications
Revision as of 18:19, 29 November 2014 by Eric.freyssinet (talk | contribs)
This category uses the form Publication.
Pages in category "Publications"
The following 200 pages are in this category, out of 789 total.
(previous page) (next page)"
A
- A case study on Storm worm
- A chat with NGR Bot
- A DDoS family affair: Dirt Jumper bot family continues to evolve
- A Foray into Conficker’s Logic and Rendezvous Points
- A new iteration of the TDSS/TDL-4 malware using DGA-based command and control
- A peek inside the Darkness (Optima) DDoS Bot
- A peek inside the PickPocket botnet
- A quick update on spambot Kelihos
- A ScarePakage variant is targeting more countries : impersonating Europol and AFP
- A study of the Ilomo / Clampi botnet
- A study on botnet detection techniques
- AbaddonPOS: A new point of sale threat linked to Vawtrak
- Acquisition and analysis of volatile memory from Android devices
- Actually, my name is Duqu - Stuxnet is my middle name
- Adobe Flash Player 0-day and HackingTeam's Remote Control System
- Adrenalin botnet. The trend marks the Russian crimeware
- Advancing the fight against botnets with consumer notifications
- Aldi Bot - bka.de DDoS
- Alina: casting a shadow on POS
- Alina: following the shadow part 1
- Alina: following the shadow part 2
- All-in-one malware: an overview of Sality
- An advanced hybrid peer-to-peer botnet
- An analysis of Dorkbot’s infection vectors (part 2)
- An analysis of the cross-platform backdoor NetWeirdRC
- An Analysis of the iKeeB (duh) iPhone botnet (Worm)
- An analysis of underground forums
- An encounter with trojan Nap
- An evaluation of current and future botnet defences
- An interesting case of JRE sandbox breach (CVE-2012-0507)
- An internet census taken by an illegal botnet – A qualitative assessment of published measurements
- An overnight sensation — CoreBot returns as a full-fledged financial malware
- An overview of exploit packs
- An overview of messaging botnets
- Analyse de Xtreme RAT
- Analyse et poncage du botnet HerpesNet
- Analyse of the sample cdorked.A
- Analyse statique de Duqu stage 1
- Analyse statique de Duqu stage 2
- Analysis of a PlugX malware variant used for targeted attacks
- Analysis of a stage 3 Miniduke malware sample
- Analysis of a VBScript bot
- Analysis of a “/0” stealth scan from a botnet
- Analysis of DarkMegi aka NpcDark
- Analysis of functions used to encode strings in Flame (GDB script)
- Analysis of ngrBot
- Analysis of TDL4
- Analysis of the Finfisher lawful interception malware
- Analysis of the malware of Red October - Part 1
- Analysis of the malware of Red October - Part 2
- Analysis of Ysreef (a variant of Tobfy)
- Analysis: Malware Win32/Rimecud.B
- Analyzing a new exploit pack
- Anaru malware now live and ready to steal
- And real name of Magnitude is....
- Android malware pairs man-in-the-middle with remote-controlled banking trojan
- Android Marcher now marching via porn sites
- Android RATs branch out with Dendroid
- Android trojan used to create simple SMS spam botnet
- Android.Bmaster: A million-dollar mobile botnet
- Android.Counterclank found in official Android market
- Andromeda 2.7 features
- Angler Exploit Kit – Operating at the Cutting Edge
- Anonymous supporters tricked into installing ZeuS trojan
- Another family of DDoS bots: Avzhan
- Anunak:APT against financial institutions
- Análisis del comportamiento de VOlk y sus funcionalidades
- Apache binary backdoors on Cpanel-based servers
- Apple releases Java update; includes fix for vulnerability exploited by Flashback malware
- Apple took 3 years to fix Finfisher trojan hole
- Apple zombie malware 'NetWeird' rummages for browser and email passwords
- APT1: technical backstage
- Armenian Bredolab creator jailed for computer sabotage
- Attack on Zygote: a new twist in the evolution of mobile threats
- Attackers place Command and Control servers inside enterprise walls
- Attention! All data on your hardrive is encrypted
- AutoIT ransomware
- Avalanche phishers migrate to ZeuS
- Avatar rootkit: the continuing saga
B
- Back to Stuxnet: the missing link
- Backdoor uses Evernote as command and control server
- Backdoor:Win32/Caphaw.A
- Banking trojan Dridex uses macros for infection
- BareBox: efficient malware analysis on bare-metal
- Battling the Rustock threat
- Battling the Zbot threat
- Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration Panel
- Bitcrypt broken
- Black Dragon: "... and all will burn beneath the shadow of my wings"
- BlackEnergy competitor – The 'Darkness' DDoS bot
- Blackhole & Cridex: season 2 episode 1: Intuit spam & SSL traffic analysis
- Blackhole and Cool Exploit kits nearly extinct
- Blackhole exploit kit v2 on the rise
- Blackhole Ramnit - samples and analysis
- Blackhole, CVE-2012-0507 and Carberp
- Bleeding Life Exploit Pack
- Bot herders build newer versions of previous botnet Waledac
- Bot of the day: Ramnit/Ninmul
- Bot Roast II nets 8 individuals
- Bot shopping with my wife
- BoteAR: a “social botnet”- What are we talking about
- BotGrep: finding P2P bots with structured graph analysis
- BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection
- Botnet command server hidden in Tor
- Botnet construction, control and concealment
- Botnet operation disabled
- Botnet shutdown success story - again: disabling the new Hlux/Kelihos botnet
- Botnet shutdown success story: how Kaspersky Lab disabled the Hlux/Kelihos botnet
- Botnet: classification, attacks, detection, tracing, and preventive measures
- Botnets on discount!
- Boxer SMS trojan: malware as a global service
- Bredolab botmaster ‘Birdie’ still at large
- Bredolab severely injured but not dead
- Buh-bye Beebone! Law enforcement kills polymorphic virus-spreading botnet
C
- Carbanak/Anunak in the BlueCoat malware analysis appliance
- Carbanak: Multi-million dollar cybercrime gang focuses on banks rather than their customers
- Carberp + BlackHole = growing fraud incidents
- Carberp - a modular information stealing trojan
- Carberp gang evolution: CARO 2012 presentation
- Carberp reverse engineering
- Carberp steals e-cash vouchers from Facebook users
- Carberp, the renaissance ?
- Carberp-based trojan attacking SAP
- Carberp-in-the-Mobile
- Carberp: it’s not over yet
- Carberp: Silent trojan, eventual successor to ZeuS
- Case study of the Miner botnet
- Cerber Dominates Ransomware Landscape After Locky's Demise
- Chameleon botnet grabbed $6m A MONTH from online ad-slingers
- Chapro.A source code
- Chasing cybercrime: network insights of Dyre and Dridex trojan bankers
- China targets macs used by NGOs
- Cimbot - A technical analysis
- Citadel : le fichier de configuration
- Citadel plitfi botnet report
- Citadel trojan malware analysis
- Citadel trojan touts trouble-ticket system
- Citadel V1.3.5.1: enter the fort’s dungeons
- Citadel ZeuS bot
- Citadel: a cyber-criminal’s ultimate weapon?
- Clampi/Ligats/Ilomo trojan
- Collateral damage: Microsoft hits security researchers along with Citadel
- Combatting point-of-sale malware
- MediaWiki:Common.js
- Conficker working group: lessons learned
- Confidential documents from Japanese politics stolen by malware
- Cool EK : "Hello my friend..." CVE-2012-5076
- Cool Exploit Kit - A new Browser Exploit Pack on the Battlefield with a "Duqu" like font drop
- Cool exploit kit - URL structure
- Coordinated DDoS attack during Russian Duma elections
- Coreflood botnet - Detection and remediation
- Covert channels over social networks
- Cracking down on botnets
- Cracking into the new P2P variant of Zeusbot/Spyeye
- Cracking the encrypted C&C protocol of the ZeroAccess botnet
- Crisis for Windows sneaks onto virtual machines
- Critroni crypto ransomware seen using Tor for command and control
- Cross-platform Frutas RAT builder and back door
- Crypto breakthrough shows Flame was designed by world-class scientists
- Crypto experts called on to crack cyberspy tool's encryption
- CryptoDefense and How Decrypt ransomware information guide and FAQ
- CryptXXX: new ransomware from the actors behind Reveton, dropping via Angler
- CTB-Locker is back: the web server edition
- Cutwail drives spike in malicious HTML attachment spam
- CVE-2012-4681 - On its way to Sakura Exploit Kit too
- CVE-2012-4681 - Redkit Exploit Kit - I want Porche Turbo
- CVE-2012-4681 - Связка Sweet Orange
- CVE-2012-5076 - Massively adopted - Blackhole update to 2.0.1
- CVE-2013-1493 (jre17u15 - jre16u41) integrating exploit kits
- CVE-2013-2465/CVE-2013-2471/CVE-2013-2463 integrating Exploit Kits -- jre7u21 CVE- jre6u45 and earlier
- CVE-2013-5330 (Flash) in an unknown Exploit Kit fed by high rank websites
- CVE-2015-0311 (Flash up to 16.0.0.287) integrating Exploit Kits
- Cyber gang seeks botmasters to wage massive wave of trojan attacks against U.S. banks
D
- DaRK DDoSseR leads to Gh0st RAT
- DarkMegi rootkit - sample (distributed via Blackhole)
- Darkmegi: this is not the Rootkit you’re looking for
- Darkness DDoS bot version identification guide
- DDoS attacks: the Zemra bot
- DDoS watch: keeping an eye on Aldi Bot
- De code van Dorifel nader bekeken
- Demystifying Pobelka
- Department of Justice takes action to disable international botnet
- Department of Labor strategic web compromise
- Detecting extended attributes (ZeroAccess) and other Frankenstein’s monsters with HMFT
- Detection and classification of different botnet C&C channels
- DGAs and cyber-criminals: a case study
- Dharma Ransomware Uses AV Tool to Distract from Malicious Activities
- Digging inside Tinba malware - A walkthrough
- Digging into the Nitol DDoS botnet
- Dirt Jumper DDoS bot increasingly popular
- Discerning relationships: the Mexican botnet connection
- DISCLOSURE: detecting botnet command and control servers through large-scale NetFlow analysis
- Discovered: botnet costing display advertisers over six million dollars per month
- Disorderly conduct: localized malware impersonates the police
- Disttrack malware overwrites files, infects MBR