Category:Publications
Revision as of 17:19, 29 November 2014 by Eric.freyssinet (talk | contribs)
This category uses the form Publication.
Pages in category "Publications"
The following 200 pages are in this category, out of 789 total.
(previous page) (next page)D
- Disttrack sabotage malware wipes data at unnamed Middle East energy organization
- DNS: a botnet dialect
- Doctor Web a détecté un botnet enrôlant plus de 550 000 Mac
- Doctor Web exposes 550 000 strong Mac botnet
- Domain generation algorithms (DGA) in stealthy malware
- Dorifel crypto malware paralyzes Dutch companies and public sector
- Dorifel is much bigger than expected and it’s still active and growing!
- Dorifel virus gereed voor Nederlandse banking phishing
- Dorifel/Quervar: the support scammer’s secret weapon
- Dorkbot: conquistando Latinoamérica
- Dragonfly Threat Against Western Energy Suppliers
- Dridex learns new trick: P2P over HTTP
- DroidLive New SMS Android Trojan
- Duqu FAQ
- Dutch users served Sinowal for lunch
- Dyre Banking Trojan
E
- Egypt Finfisher intrusion tools and ethics
- Emerging attack vectors - RSA slide deck
- Encyclopedia entry: Win32/Carberp
- Encyclopedia entry: Win32/Conficker
- Encyclopedia entry: Win32/Oderoor
- Equation: the Death Star of malware galaxy
- ESET analyzes first Android file-encrypting, TOR-enabled ransomware
- Esthost taken down - Biggest cybercriminal takedown in history
- Etude sur le fonctionnement du Trojan.Matsnu.1 codant les données des utilisateurs
- EURO Winlocker
- Evolution of Win32Carberp: going deeper
- Exploring the market for stolen passwords
F
- F-Secure has discovered MiniDuke malware samples in the wild
- Fake FBI Ransomware analysis
- FAQ on Kelihos.B/Hlux.B sinkholing
- Fast look at an infection by a Blackhole Exploit Kit 2.0
- Fast look at Sundown EK
- FBI ransomware now targeting Apple’s Mac OS X users
- FBI shuts down Coreflood botnet, zombies transmitting financial data
- Feodo - a new botnet on the rise
- Festi botnet analysis & investigation
- FighterPOS: a new one-man PoS malware campaign
- File infector Expiro hits US, steals FTP credentials
- First step in cross-platform Trojan bankers from Brazil done
- First widespread virus cross-infection
- Five charged in largest hacking scheme ever prosecuted in US
- Flame, Duqu and Stuxnet: in-depth code analysis of mssecmgr.ocx
- Flame: replication via Windows Update MITM proxy
- Flamer analysis: framework reconstruction
- Flamer: highly sophisticated and discreet threat targets the Middle East
- Flamer: urgent suicide
- Flashfake Mac OS X botnet confirmed
- Fortiguard: Android/Stiniter.A!tr
- From Georgia, with love Win32/Georbot
- From Sakura to Reveton via Smoke Bot - or a botnet distribution of Reveton
- Full analysis of Flame's Command & Control servers
- Full analysis of Flame's command & control servers
G
- Gamarue dropping Lethic bot
- GandCrab ransomware distributed by RIG and GrandSoft exploit kits
- Gangstaservice Winlock Affiliate
- Gauss: abnormal distribution
- Gauss: Nation-state cyber-surveillance meets banking Trojan
- Get gamed and rue the day...
- Getting more "personal" & deeper into Cridex with parfeit credential stealer infection
- Gimemo finally targeting USA with Camera Feature too
- Gimemo wants to play in the big league
- GingerMaster Android Malware Utilizing A Root Exploit
- Going solo: self-propagating ZBOT malware spotted
- Google Groups trojan
- Got malware? Rent an exploit service
- Gumblar Google-poisoning attack morphs
- Guys behind Gauss and Flame are the same
H
- Hackers are increasingly targeting IoT Devices with Mirai DDoS Malware
- Hammertoss: stealthy tactics define a Russian cyber threat group
- HARMUR: storing and analyzing historic data on malicious domains
- Harnig botnet: a retreating army
- Harnig is back
- Harvesting data on the Xarvester botmaster
- Have we seen the end of the ZeroAccess botnet?
- Hello Neutrino ! (just one more Exploit Kit)
- Herpes botnet
- HerpesNet botnet 1.7
- Hesperbot – A new, advanced banking trojan in the wild
- Hiding in plain sight: the FAKEM remote access trojan
- Hiloti: the (bot)master of disguise
- Hodprot: hot to bot
- How Lockergoga took down Hydro — ransomware used in targeted attacks aimed at big business
- How to steal a Botnet and what can happen when you do
- HTran and the Advanced Persistent Threat
- Hébergeurs malhonnêtes : nouvelle fermeture (3FN)
I
- IcoScript: using webmail to control malware
- Illuminating the Etumbot APT backdoor
- Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat
- Infamous Skynet botnet author allegedly arrested
- Inside an APT campaign with multiple targets in India and Japan
- Inside Andromeda Bot v2.06 Webpanel / AKA Gamarue - Botnet Control Panel
- Inside Blackhole Exploits Kit v1.2.4 - Exploit Kit Control Panel
- Inside Carberp botnet
- Inside Citadel 1.3.4.5 C&C & Builder - Botnet Control Panel
- Inside Impact exploit kit
- Inside Pony 1.7 / Fareit C&C - Botnet Control Panel
- Inside Smoke Bot - botnet control panel
- Inside Smoke Bot - Botnet Control Panel
- Inside Styx exploit kit control panel
- Inside the Grum botnet
- Inside the world of the Citadel trojan
- Inside Ulocker
- Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control Panel
- Inside view of Lyposit aka (for its friends) Lucky LOCKER
- Insights from the analysis of the Mariposa botnet
- Insights into Win32/Bradop
- Interconnection of Gauss with Stuxnet, Duqu & Flame
- International cyber ring that infected millions of computers dismantled
- Internet Census 2012, port scanning /0 using insecure embedded devices
- Introducing Ponmocup-Finder
- IRC bot for Android
- It’s 2012 and Armageddon has arrived
- It’s not the end of the world: DarkComet misses by a mile
J
K
- Kaptoxa point-of-sale compromise
- Karagny.L unpack
- Kaspersky Lab et Seculert annoncent la récente découverte de « Madi », une nouvelle attaque de cyberespionnage au Moyen‑Orient
- Kaspersky security bulletin 2015. Overall statistics for 2015
- Kelihos back in town using Fast Flux
- Kelihos botnet appears again with new variant
- Kelihos botnet trying to expand by harnessing Russian national sentiments
- Kelihos is dead. Long live Kelihos
- Kelihos is dead… No wait… Long live Kelihos! Again!
- Kelihos/Hlux botnet returns with new techniques
- Kelihos: not alien resurrection, more attack of the clones
- King of spam:Festi botnet analysis
- Know your enemy: tracking botnets
- Koobface botnet master KrotReal back in business, distributes ransomware and promotes BHSEO service/product
- Koobface, un écosystème cybercriminel ou le conte des Mille et une nuits ?
- Kore exploit kit
- Kraken botnet infiltration
L
- Large-scale analysis of malware downloaders
- Latest Kelihos botnet shut down live at RSA Conference 2013
- Latest SpyEye botnet active and cheaper
- Latin American banks under fire from the Mexican VOlk-botnet
- Le dropper de CTB-Locker
- Learning stateful models for network honeypots
- Legal implications of countering botnets
- Leouncia - Yet another backdoor
- Leouncia - Yet another backdoor - Part 2
- Library file in certain Android apps connects to C&C servers
- Lifting the lid on the Redkit exploit kit (Part 1)
- Lights Out: Dragonfly is on the move
- Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole
- Live Coronavirus Map Used to Spread Malware
- Locky Ransomware switches to the Lukitus extension for Encrypted Files
- LogPOS - new point of sale malware using mailslots
- Long life to Kelihos!
- Look what I found: it's a Pony!
M
- Maazben: best of both worlds
- Mac BackDoor.Wirenet.1 config extractor
- Mac Flashback exploiting unpatched Java vulnerability
- Mac spyware found at Oslo Freedom Forum
- Madi is back - New Tricks and a new Command&Control server
- Mahdi malware finds 150 new targets including U.S. and Germany, gets more evasive
- Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-mode
- Malicious Apache module injects Iframes
- Malicious Apache module used for content injection: Linux/Chapro.A
- Malware 2 - from infection to persistence
- Malware analysis of the Lurk downloader
- Malware analysis Rannoh/Matsnu
- Malware analysis tutorial 32: exploration of botnet client
- Malware attacking POS systems
- Malware discovered developed with Google's "Go" programming language
- Malware evolving to defeat anti-DDoS services like CloudFlare?
- Malware for everyone - Aldi Bot at a discount price
- Malware hunting with the Sysinternals tools
- Malware Memory Analysis - Volatility
- Malware pandemics
- Malware targeting Windows 8 uses Google Docs
- Malware Uses Google Go Language
- Mariposa botnet 'mastermind' jailed in Slovenia
- Massive Drop in number of active Zeus C&C servers
- Massive search fraud botnet seized by Microsoft and Symantec
- Mastermind behind Gozi bank malware charged along with two others
- McAfee Labs threat advisory : W32.Pinkslipbot
- MDK: the largest mobile botnet in China
- Measuring and detecting Fast-Flux service networks
- Measuring and detecting malware downloads in live network traffic
- Measuring botnet populations
- Meet "Red Dot exploit toolkit"
- Meet CritXPack (Previously Vintage Pack)
- Meet ProPack Exploit Pack - yes that's a lot of pack
- Meet ‘Flame’, the massive spy malware infiltrating Iranian computers
- Members of the largest criminal group engaged in online banking fraud are detained
- Mexican Twitter-controlled botnet unpicked
- Microsoft and financial services industry leaders target cybercriminal operations from ZeuS botnets
- Microsoft and Symantec take down Bamital botnet that hijacks online searches
- Microsoft disrupts the emerging Nitol botnet being spread through an unsecure supply chain
- Microsoft neutralizes Kelihos botnet, names defendant in case
- Microsoft partners with Interpol, industry to disrupt global malware attack affecting more than 770,000 PCs in past six months
- Microsoft security updates January 2016
- Miniduke
- MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled
- Mocbot spam analysis
- Monkif botnet hides commands in JPEGs
- More details of the Dorifel servers