Property:Botnet
From Botnets.fr
Jump to navigation
Jump to search
This is a property of type
Page
. Default form:
Botnet
Usage
1045
previous 500
20
50
100
250
500
next 500
Filter
<p>The <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Help:Property_page/Filter">search filter</a> allows the inclusion of <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Help:Query_expressions">query expressions</a> such as <code>~</code> or <code>!</code>. The selected <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Query_engine">query engine</a> might also support case insensitive matching or other short expressions like:</p><ul><li><code>in:</code> result should include the term, e.g. '<code>in:Foo</code>'</li></ul><ul><li><code>not:</code> result should to not include the term, e.g. '<code>not:Bar</code>'</li></ul>
Showing 166 pages using this property.
T
TDL3 : The rootkit of all evil
+
TDSS
+
TDL3 : Why so serious
+
TDSS
+
TDL4 - Top Bot
+
TDL-4
+
TDL4 reloaded: Purple Haze all in my brain
+
TDL-4
+
TDSS botnet: full disclosure
+
TDSS
+
TR-24 analysis - Destory RAT family
+
Destory
+
,
PlugX
+
,
Sogu
+
,
…
Takeover of Virut domains
+
Virut
+
Taking down botnets: Microsoft and the Rustock botnet
+
Rustock
+
Tales from Crisis, Chapter 1: The dropper’s box of tricks
+
Crisis
+
Tales from Crisis, Chapter 2: Backdoor’s first steps
+
Crisis
+
Tales from Crisis, Chapter 3: The Italian rootkit job
+
Crisis
+
Tales from Crisis, Chapter 4: a ghost in the network
+
Crisis
+
Targeted attacks and Ukraine
+
MiniDuke
+
Targeted destructive malware explained: Troj/Mdrop-ELD
+
DistTrack
+
Targeted information stealing attacks in South Asia use email, signed binaries
+
HangOver
+
Tatanga attack exposes chipTAN weaknesses
+
Tatanga
+
Tatanga: a new banking trojan with MitB functions
+
Tatanga
+
The "Red October" campaign - An advanced cyber espionage network targeting diplomatic and government agencies
+
Rocra
+
The 'Penquin' Turla
+
Turla
+
The ACCDFISA malware family – Ransomware targeting Windows servers
+
Accdfisa
+
The ACCDFISA malware family – Ransomware targetting Windows servers
+
Accdfisa
+
The Andromeda/Gamarue botnet is on the rise again
+
Andromeda
+
The Coreflood report
+
Coreflood
+
The Cridex trojan targets 137 financial organizations in one go
+
SpyEye
+
,
Carberp
+
,
Cridex
+
,
…
The DGA of Symmi
+
Beebone
+
The Dorkbot rises
+
Dorkbot
+
The Epic Turla operation
+
Turla
+
The Flame: questions and answers
+
Flame
+
The IMDDOS botnet: discovery and analysis
+
IMDDOS
+
The Madi campaign - Part II
+
Madi
+
The Miner botnet: Bitcoin mining goes peer-to-peer
+
Miner
+
The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoor
+
MiniDuke
+
The Mirage campaign
+
Mirage
+
The Pobelka botnet - a command and control case study
+
Citadel
+
,
Pobelka
+
The Sality botnet
+
Cutwail
+
,
Maazben
+
,
Rustock
+
,
…
The Target breach by the numbers
+
BlackPOS
+
The Waledac protocol: the how and why
+
Waledac
+
The ZeroAccess botnet revealed
+
ZeroAccess
+
The ZeroAccess botnet: mining and fraud for massive financial gain
+
ZeroAccess
+
The ZeroAccess rootkit
+
ZeroAccess
+
The anatomy of a botnet
+
YoYo
+
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet
+
Waledac
+
The case of TDL3
+
TDSS
+
The evolution of webinjects
+
SpyEye
+
,
ZeuS
+
The first trojan in history to steal Linux and Mac OS X passwords
+
Wirenet
+
The graphic design of "Maktub Locker" ransomware
+
Maktub Locker
+
The growing threat to business banking online
+
Clampi
+
The lifecycle of peer-to-peer (Gameover) ZeuS
+
Cutwail
+
,
Dirt Jumper
+
,
Gameover
+
,
…
The most sophisticated Android trojan
+
Obad
+
The mystery of Duqu framework solved
+
Duqu
+
The mystery of Duqu: part five
+
Duqu
+
The mystery of Duqu: part one
+
Duqu
+
,
Stuxnet
+
The mystery of Duqu: part six (the command and control servers)
+
Duqu
+
The mystery of Duqu: part ten
+
Duqu
+
The mystery of Duqu: part three
+
Duqu
+
The mystery of Duqu: part two
+
Duqu
+
The mystery of the Duqu framework
+
Duqu
+
The real face of Koobface: the largest web 2.0 botnet explained
+
Koobface
+
The rise of TOR-based botnets
+
Atrax
+
,
PTA
+
The tigger trojan: icky, sticky stuff
+
Tigger
+
The underground economy of spam: a botmaster's perspective of coordinating large-scale spam campaigns
+
Cutwail
+
The where and why of Hlux
+
Bredolab
+
,
Kelihos
+
,
Virut
+
,
…
The world's biggest botnets
+
RBot
+
,
Bobax
+
,
Storm
+
The ‘Madi’ infostealers - a detailed analysis
+
Madi
+
The ‘advertising’ botnet
+
Renos
+
The “Hikit” rootkit: advanced and persistent attack techniques (part 1)
+
Hikit
+
The “Hikit” rootkit: advanced and persistent attack techniques (part 2)
+
Hikit
+
Three month FrameworkPOS malware campaign nabs ~43,000 credit cards from point of sale systems
+
FrameworkPOS
+
Tilon-son of Silon
+
Silon
+
,
Tilon
+
Tilon/SpyEye2 intelligence report
+
Silon
+
,
Tilon
+
TinyNuke may be a ticking time bomb
+
TinyNuke
+
Top 50 bad hosts & networks 2011 Q4
+
Dirt Jumper
+
,
ZeuS
+
Top spam botnets exposed
+
Cutwail
+
,
Bobax
+
,
Grum
+
,
…
Torpig - Back to the future or how the most sophisticated trojan in 2008 reinvents itself
+
Torpig
+
TorrentLocker ransomware uses email authentication to refine spam runs
+
TorrentLocker
+
Tracking down the author of the PlugX RAT
+
PlugX
+
Travnet botnet steals huge amount of sensitive data
+
Travnet
+
Travnet trojan could be part of APT campaign
+
Travnet
+
TreasureHunt: a custom POS malware tool
+
TreasureHunt
+
Trend Micro discovers MalumPoS; malware targeting hotels and other US industries
+
MalumPoS
+
Trojan ChePro, the CPL storm
+
ChePro
+
Trojan Nap aka Kelihos/Hlux - Feb. 2013 status update
+
Kelihos
+
Trojan downloaders on the rise: don’t let Locky or TeslaCrypt ruin your day
+
TeslaCrypt
+
,
Locky
+
,
Nemucod
+
Trojan horse using sender policy framework
+
Spachanel
+
Trojan on the loose: an in-depth analysis of police trojan
+
Goldenbaks
+
Trojan.Prinimalka: bits and pieces
+
Gozi
+
,
Prinimalka
+
Trojan.Ransomgerpo criminal arrested
+
Ransom.EY
+
Trojan.Taidoor takes aim at policy think tanks
+
Taidoor
+
Trojan.Tatanarg.B careful!
+
Tatanarg
+
,
Spamuzle
+
Trojan.Whitewell: what’s your (bot) Facebook status today?
+
Whitewell
+
Trojan.ZeroAccess infection analysis
+
ZeroAccess
+
Trusteer warns of new two headed trojan attack against online banks
+
Silon
+
Twitter + Pastebin = malware update
+
Sninfs
+
U
Under the hood of Carberp: Malware & configuration analysis
+
Carberp
+
Unexpected reboot: Necurs
+
Necurs
+
Unveiling an Indian cyberattack infrastructure - a special report
+
HangOver
+
Unveiling the network criminal infrastructure of TDSS/TDL4 - DGAv14: a case study on a new TDSS/TDL4 variant
+
TDL-4
+
,
DGAv14
+
Upas Kit (aka Rombrast) integrates webinjects
+
Upas
+
Upatre, Dyre used in Univ. of Florida attack
+
Dyre
+
,
Upatre
+
Update to Citadel : 1.3.5.1 Rain Edition.
+
Citadel
+
Update to Citadel : v.1.3.4.5
+
Citadel
+
Urausy has big plan for Europe - Targeting 3 new countries among which Norway !
+
Urausy
+
Urausy improving its localization - A (the\?) Gaelic Ransomware with Interpol impersonation as default landing
+
Urausy
+
Urausy ransomware - July 2013 design refresh - "Summer 2013 collection"
+
Urausy
+
Urausy: Colorfull design refresh (+HR) & EC3 Logo
+
Urausy
+
V
VOlk-botnet takes over Latin America
+
VOlk
+
Vawtrak gains momentum and expands targets
+
Neverquest
+
,
Gozi
+
,
Prinimalka
+
Versatile and infectious: Win64/Expiro is a cross-platform file infector
+
Expiro
+
VinSelf - A new backdoor in town
+
VinSelf
+
ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar
+
ViperRAT
+
Virus Gendarmerie : variante Office Centrale de Luttre contre la criminalité – controle informationnel
+
Epubb
+
Virut malware fuels Waledac botnet resurgence
+
Virut
+
,
Waledac
+
W
W32.Duqu, the precursor to the next Stuxnet
+
Duqu
+
W32.Flamer: spreading mechanism tricks and exploits
+
Flame
+
W32.Qakbot in detail
+
Akbot
+
W32.Shadesrat (Blackshades) author arrested
+
BlackShades
+
W32.Stuxnet dossier
+
Stuxnet
+
W32.Tinba (Tinybanker) The turkish incident
+
Tinba
+
W32.Xpaj.B: making easy money from complex code
+
Xpaj
+
Waledac Botnet - Deployment and Communication Analysis
+
Waledac
+
Waledac gets cozy with Virut
+
Virut
+
,
Waledac
+
Walking through Win32/Jabberbot.A instant messaging C&C
+
Jabberbot
+
Watch out for CoreBot, new stealer in the wild
+
CoreBot
+
Weelsof use SSL C&C
+
Weelsof
+
What was that Wiper thing?
+
Wiper
+
What’s the buzz with Bafruz
+
Rannoh
+
,
Bafruz
+
Where Are They Today? Cybercrime Trojans That No One Misses: Shifu Malware
+
Shifu
+
Who's behind the Koobface botnet? - An OSINT analysis
+
Koobface
+
Who's behind the world's largest spam botnet?
+
Grum
+
Win32/64:Napolar: New trojan shines on the cyber crime-scene
+
Solar
+
Win32/Gataka - or should we say Zutick?
+
Tatanga
+
,
Tinba
+
Win32/Gataka banking Trojan - Detailed analysis
+
Tatanga
+
Win32/Gataka: a banking Trojan ready to take off
+
SpyEye
+
,
Tatanga
+
Win32/Sality newest component: a router’s primary DNS changer named Win32/RBrute
+
Sality
+
Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems
+
Ranbyus
+
Win32/Virlock: First Self-Reproducing Ransomware is also a Shape Shifter
+
VirLock
+
Win32/Vundo
+
Ponmocup
+
Winlock affiliate
+
Ransom.II
+
Wire Transfer Spam Spreads Upatre
+
Upatre
+
Worm:VBS/Jenxcus
+
Jenxcus
+
X
XPAJ: reversing a Windows x64 bootkit
+
Xpaj
+
Xarvester, the new Srizbi?
+
Xarvester
+
Xpaj Botnet intercepts up to 87 million searches per year
+
Xpaj
+
Y
You dirty RAT! Part 1 – DarkComet
+
DarkComet
+
You dirty RAT! part 2 – BlackShades NET
+
BlackShades
+
,
DarkComet
+
Your botnet is my botnet: analysis of a botnet takeover
+
Torpig
+
Your files are encrypted with a “Windows 10 Upgrade”
+
CTB-Locker
+
Z
ZACCESS/SIREFEF arrives with new infection technique
+
ZeroAccess
+
Zemra (panel)
+
Zemra
+
ZeroAccess - new steps in evolution
+
ZeroAccess
+
ZeroAccess anti-debug uses debugger
+
ZeroAccess
+
ZeroAccess's way of self-deletion
+
ZeroAccess
+
ZeroAccess: code injection chronicles
+
ZeroAccess
+
ZeroLocker won't come to your rescue
+
ZeroLocker
+
ZeuS Gameover overview
+
Gameover
+
ZeuS ransomware feature: win unlock
+
ZeuS
+
ZeuS – P2P+DGA variant – mapping out and understanding the threat
+
Gameover
+
,
ZeuS
+
ZeuS-P2P monitoring and analysis
+
Gameover
+
ZeuS: me talk pretty Finnish one day
+
ZeuS
+
ZeuSbot/Spyeye P2P updated, fortifying the botnet
+
SpyEye
+
,
ZeuS
+
,
Kelihos
+
,
…
Zeus variant Floki bot targets PoS data
+
Floki
+
Zorenium bot not half the threat it claims to be
+
Zorenium
+
Н
Новый сэмпл Pandora DDoS Bot
+
Pandora
+
‘
‘Dexter’ virus targets point-of-sale terminals
+
Dexter
+
‘Project Blitzkrieg’ promises more aggressive cyberheists against U.S. banks
+
Prinimalka
+
“
“Nemanja” botnet identified by IntelCrawler – Over a thousand point-of-sales, grocery management and accounting systems are compromised all over the world
+
Nemanja
+
Navigation menu
Personal tools
Log in
Namespaces
Property
Discussion
Variants
Views
Read
View source
View history
More
Search
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Upload file
Special pages
Printable version
Permanent link
Page information
Browse properties