Kaspersky lab

From Botnets.fr
Revision as of 20:38, 30 July 2015 by Eric.freyssinet (talk | contribs) (Created page with "{{Editor}}")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Editor) Link to the old Wiki page : [1]

Kaspersky lab
Link

Introduction

Publications

 AuthorBotnetCampaignYear
"NetTraveler is Running!" - Red Star APT attacks compromise high-profile victimsGReATNetTravelerRed Star2013
Adobe Flash Player 0-day and HackingTeam's Remote Control SystemSergey Golovanov2013
Armenian Bredolab creator jailed for computer sabotageChristopher BrookBredolab2012
Back to Stuxnet: the missing linkAleksFlame
Stuxnet
2012
BoteAR: a “social botnet”- What are we talking aboutJorge MieresBoteAR2012
Botnet shutdown success story - again: disabling the new Hlux/Kelihos botnetStefan OrtloffKelihos2012
Botnet shutdown success story: how Kaspersky Lab disabled the Hlux/Kelihos botnetTillmann WernerKelihos2011
Carberp-in-the-MobileDenis MaslennikovCarberp2012
Carberp: it’s not over yetVyacheslav ZakorzhevskyCarberp2012
Critroni crypto ransomware seen using Tor for command and controlDennis FisherCTB-Locker2014
Dorifel is much bigger than expected and it’s still active and growing!David JacobyDorifel2012
Duqu FAQRyan NaraineDuqu
Stuxnet
2011
Flame: replication via Windows Update MITM proxyAleksFlame2012
Flashfake Mac OS X botnet confirmedIgor SoumenkovFlashback2012
Full analysis of Flame's Command & Control serversGReATFlame2012
Full analysis of Flame's command & control serversGReATFlame2012
Gauss: Nation-state cyber-surveillance meets banking TrojanGReATFlame
Gauss
Stuxnet
2012
Gauss: abnormal distributionGReATGauss2012
IRC bot for AndroidDenis Maslennikov2012
Kelihos/Hlux botnet returns with new techniquesMaria GarnaevaKelihos2012
Latest Kelihos botnet shut down live at RSA Conference 2013Michael MimosoKelihos2013
Latin American banks under fire from the Mexican VOlk-botnetJorge MieresVOlk2011
Madi is back - New Tricks and a new Command&Control serverNicolas BrulezMadi2012
NetTraveler APT gets a makeover for 10th birthdayKurt Baumgartner
Costin Raiu
NetTraveler2014
NetTraveler is back: the 'Red Star' APT returns with new tricksCostin RaiuNetTravelerRed Star2013
New Mac malware discovered on attendee computer at anti-surveillance workshopBrian DonohueHangOver2013
New crimeware attacks LatAm bank usersJorge MieresPiceBOT
VOlk
S.A.P.Z.
2013
Shamoon the Wiper in detailsDmitry TarakanovShamoon2012
Shamoon the Wiper: further details (Part II)Dmitry TarakanovShamoon2012
Shamoon the wiper - copycats at workGReATShamoon
EraseMBR
2012
TDL4 - Top BotSergey Golovanov
Igor Soumenkov
TDL-42011
The "Red October" campaign - An advanced cyber espionage network targeting diplomatic and government agenciesGReATRocraRed October2013
The Epic Turla operationGReATTurlaEpic Turla2014
The Flame: questions and answersAlexander GostevFlame2012
The Madi campaign - Part IINicolas BrulezMadi2012
The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoorGReATMiniDuke2013
The most sophisticated Android trojanRoman UnuchekObad2013
The mystery of Duqu framework solvedIgor SoumenkovDuqu2012
The mystery of Duqu: part fiveIgor SoumenkovDuqu2011
The mystery of Duqu: part oneAlexander GostevDuqu
Stuxnet
2011
The mystery of Duqu: part six (the command and control servers)Vitaly KamlukDuqu2011
The mystery of Duqu: part tenAlexander GostevDuqu2012
The mystery of Duqu: part threeAlexander GostevDuqu2011
The mystery of Duqu: part twoAlexander GostevDuqu2011
The mystery of the Duqu frameworkIgor SoumenkovDuqu2012
The where and why of HluxSergey GolovanovBredolab
Kelihos
Virut
Gbot
2012
The ‘Madi’ infostealers - a detailed analysisNicolas BrulezMadi2012
The ‘advertising’ botnetMaria Garnaeva
Alexei Kadiev
Renos2011
What was that Wiper thing?GReATWiper2012
XPAJ: reversing a Windows x64 bootkitVyacheslav RusakovXpaj2012
... further results