Kaspersky lab

From Botnets.fr
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

(Editor) Link to the old Wiki page : [1]

Kaspersky lab
Link

Introduction

Publications

 AuthorBotnetCampaignYear
"NetTraveler is Running!" - Red Star APT attacks compromise high-profile victimsGReATNetTravelerRed Star2013
Adobe Flash Player 0-day and HackingTeam's Remote Control SystemSergey Golovanov2013
Armenian Bredolab creator jailed for computer sabotageChristopher BrookBredolab2012
Back to Stuxnet: the missing linkAleksFlame
Stuxnet
2012
BoteAR: a “social botnet”- What are we talking aboutJorge MieresBoteAR2012
Botnet shutdown success story - again: disabling the new Hlux/Kelihos botnetStefan OrtloffKelihos2012
Botnet shutdown success story: how Kaspersky Lab disabled the Hlux/Kelihos botnetTillmann WernerKelihos2011
Carberp-in-the-MobileDenis MaslennikovCarberp2012
Carberp: it’s not over yetVyacheslav ZakorzhevskyCarberp2012
Critroni crypto ransomware seen using Tor for command and controlDennis FisherCTB-Locker2014
Dorifel is much bigger than expected and it’s still active and growing!David JacobyDorifel2012
Duqu FAQRyan NaraineDuqu
Stuxnet
2011
Flame: replication via Windows Update MITM proxyAleksFlame2012
Flashfake Mac OS X botnet confirmedIgor SoumenkovFlashback2012
Full analysis of Flame's Command & Control serversGReATFlame2012
Full analysis of Flame's command & control serversGReATFlame2012
Gauss: Nation-state cyber-surveillance meets banking TrojanGReATFlame
Gauss
Stuxnet
2012
Gauss: abnormal distributionGReATGauss2012
IRC bot for AndroidDenis Maslennikov2012
Kelihos/Hlux botnet returns with new techniquesMaria GarnaevaKelihos2012
Latest Kelihos botnet shut down live at RSA Conference 2013Michael MimosoKelihos2013
Latin American banks under fire from the Mexican VOlk-botnetJorge MieresVOlk2011
Madi is back - New Tricks and a new Command&Control serverNicolas BrulezMadi2012
NetTraveler APT gets a makeover for 10th birthdayKurt Baumgartner
Costin Raiu
NetTraveler2014
NetTraveler is back: the 'Red Star' APT returns with new tricksCostin RaiuNetTravelerRed Star2013
New Mac malware discovered on attendee computer at anti-surveillance workshopBrian DonohueHangOver2013
New crimeware attacks LatAm bank usersJorge MieresPiceBOT
VOlk
S.A.P.Z.
2013
Shamoon the Wiper in detailsDmitry TarakanovShamoon2012
Shamoon the Wiper: further details (Part II)Dmitry TarakanovShamoon2012
Shamoon the wiper - copycats at workGReATShamoon
EraseMBR
2012
TDL4 - Top BotSergey Golovanov
Igor Soumenkov
TDL-42011
The "Red October" campaign - An advanced cyber espionage network targeting diplomatic and government agenciesGReATRocraRed October2013
The Epic Turla operationGReATTurlaEpic Turla2014
The Flame: questions and answersAlexander GostevFlame2012
The Madi campaign - Part IINicolas BrulezMadi2012
The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoorGReATMiniDuke2013
The most sophisticated Android trojanRoman UnuchekObad2013
The mystery of Duqu framework solvedIgor SoumenkovDuqu2012
The mystery of Duqu: part fiveIgor SoumenkovDuqu2011
The mystery of Duqu: part oneAlexander GostevDuqu
Stuxnet
2011
The mystery of Duqu: part six (the command and control servers)Vitaly KamlukDuqu2011
The mystery of Duqu: part tenAlexander GostevDuqu2012
The mystery of Duqu: part threeAlexander GostevDuqu2011
The mystery of Duqu: part twoAlexander GostevDuqu2011
The mystery of the Duqu frameworkIgor SoumenkovDuqu2012
The where and why of HluxSergey GolovanovBredolab
Kelihos
Virut
Gbot
2012
The ‘Madi’ infostealers - a detailed analysisNicolas BrulezMadi2012
The ‘advertising’ botnetMaria Garnaeva
Alexei Kadiev
Renos2011
What was that Wiper thing?GReATWiper2012
XPAJ: reversing a Windows x64 bootkitVyacheslav RusakovXpaj2012
... further results