Property:Editor
From Botnets.fr
Jump to navigation
Jump to search
This is a property of type
Page
. Default form:
Editor
.
Usage
715
previous 500
20
50
100
250
500
next 500
Filter
<p>The <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Help:Property_page/Filter">search filter</a> allows the inclusion of <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Help:Query_expressions">query expressions</a> such as <code>~</code> or <code>!</code>. The selected <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Query_engine">query engine</a> might also support case insensitive matching or other short expressions like:</p><ul><li><code>in:</code> result should include the term, e.g. '<code>in:Foo</code>'</li></ul><ul><li><code>not:</code> result should to not include the term, e.g. '<code>not:Bar</code>'</li></ul>
Showing 500 pages using this property.
"
"Crypto Ransomware" CTB-Locker (Critroni.A) on the rise
+
Kafeine
+
"NetTraveler is Running!" - Red Star APT attacks compromise high-profile victims
+
Kaspersky lab
+
"njRAT" Uncovered
+
Fidelis cybersecurity
+
'
'Tigger' trojan keeps security researchers hopping
+
UBM TechWeb
+
A
A DDoS family affair: Dirt Jumper bot family continues to evolve
+
Arbor SERT
+
A Foray into Conficker’s Logic and Rendezvous Points
+
LEET'09 Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more
+
A ScarePakage variant is targeting more countries : impersonating Europol and AFP
+
Kafeine
+
A case study on Storm worm
+
Usenix
+
A chat with NGR Bot
+
InfoSec Institude
+
A new iteration of the TDSS/TDL-4 malware using DGA-based command and control
+
Damballa
+
A peek inside the Darkness (Optima) DDoS Bot
+
Webroot
+
A peek inside the PickPocket botnet
+
Webroot
+
A quick update on spambot Kelihos
+
Abuse.ch
+
A study of the Ilomo / Clampi botnet
+
Trend Micro
+
A study on botnet detection techniques
+
International Journal of Scientific and Research Publications
+
APT1: technical backstage
+
Malware.lu
+
AbaddonPOS: A new point of sale threat linked to Vawtrak
+
Proofpoint
+
Acquisition and analysis of volatile memory from Android devices
+
Elsevier
+
Actually, my name is Duqu - Stuxnet is my middle name
+
BAE Systems stratsec
+
Adobe Flash Player 0-day and HackingTeam's Remote Control System
+
Kaspersky lab
+
Adrenalin botnet. The trend marks the Russian crimeware
+
Evilfingers
+
Advancing the fight against botnets with consumer notifications
+
Microsoft
+
Aldi Bot - bka.de DDoS
+
Youtube
+
Alina: casting a shadow on POS
+
Trustwave
+
Alina: following the shadow part 1
+
Trustwave
+
Alina: following the shadow part 2
+
Trustwave
+
All-in-one malware: an overview of Sality
+
Symantec
+
An Analysis of the iKeeB (duh) iPhone botnet (Worm)
+
SRI International
+
An advanced hybrid peer-to-peer botnet
+
School of Electrical Engineering and Computer Science University of Central Florida
+
An analysis of Dorkbot’s infection vectors (part 2)
+
Microsoft Malware Protection Centre
+
An analysis of the cross-platform backdoor NetWeirdRC
+
Intego
+
An analysis of underground forums
+
Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference
+
An encounter with trojan Nap
+
FireEye
+
An evaluation of current and future botnet defences
+
Queensland University of Technology
+
An interesting case of JRE sandbox breach (CVE-2012-0507)
+
Microsoft
+
An internet census taken by an illegal botnet – A qualitative assessment of published measurements
+
SIGCOMM Computer Communication Review
+
An overnight sensation — CoreBot returns as a full-fledged financial malware
+
Security Intelligence
+
An overview of exploit packs
+
Contagio
+
An overview of messaging botnets
+
McAfee
+
Analyse de Xtreme RAT
+
Malware.lu
+
Analyse et poncage du botnet HerpesNet
+
Malware.lu
+
Analyse of the sample cdorked.A
+
Malware.lu
+
Analyse statique de Duqu stage 1
+
Malware.lu
+
Analyse statique de Duqu stage 2
+
Malware.lu
+
Analysis of DarkMegi aka NpcDark
+
StopMalvertising
+
Analysis of TDL4
+
BAE Systems
+
Analysis of Ysreef (a variant of Tobfy)
+
Malware.lu
+
Analysis of a PlugX malware variant used for targeted attacks
+
CIRCL
+
Analysis of a VBScript bot
+
Zscaler
+
Analysis of a stage 3 Miniduke malware sample
+
CIRCL
+
Analysis of functions used to encode strings in Flame (GDB script)
+
Malware.lu
+
Analysis of ngrBot
+
StopMalvertising
+
Analysis of the Finfisher lawful interception malware
+
Rapid7
+
Analysis of the malware of Red October - Part 1
+
Malware.lu
+
Analysis of the malware of Red October - Part 2
+
Malware.lu
+
Analyzing a new exploit pack
+
Kahu Security
+
Anaru malware now live and ready to steal
+
Symantec
+
And real name of Magnitude is....
+
Kafeine
+
Android Marcher now marching via porn sites
+
Zscaler
+
Android RATs branch out with Dendroid
+
Symantec
+
Android malware pairs man-in-the-middle with remote-controlled banking trojan
+
McAfee Labs
+
Android trojan used to create simple SMS spam botnet
+
Cloudmark
+
Android.Bmaster: A million-dollar mobile botnet
+
Symantec
+
Android.Counterclank found in official Android market
+
Symantec
+
Andromeda 2.7 features
+
Fortinet
+
Angler Exploit Kit – Operating at the Cutting Edge
+
Websense
+
Anonymous supporters tricked into installing ZeuS trojan
+
Symantec
+
Another family of DDoS bots: Avzhan
+
Arbor Networks
+
Anunak:APT against financial institutions
+
Fox-IT
+
Análisis del comportamiento de VOlk y sus funcionalidades
+
ESET
+
Apache binary backdoors on Cpanel-based servers
+
Sucuri
+
Apple releases Java update; includes fix for vulnerability exploited by Flashback malware
+
Intego
+
Apple took 3 years to fix Finfisher trojan hole
+
Brian Krebs
+
Apple zombie malware 'NetWeird' rummages for browser and email passwords
+
Sophos Labs
+
Armenian Bredolab creator jailed for computer sabotage
+
Kaspersky lab
+
Attack on Zygote: a new twist in the evolution of mobile threats
+
Kaspersky Securelist
+
Attackers place Command and Control servers inside enterprise walls
+
Security Week
+
Attention! All data on your hardrive is encrypted
+
AVG
+
AutoIT ransomware
+
Malware.lu
+
Avalanche phishers migrate to ZeuS
+
Bankinfo security
+
Avatar rootkit: the continuing saga
+
ESET Welivesecurity
+
B
Back to Stuxnet: the missing link
+
Kaspersky lab
+
Backdoor uses Evernote as command and control server
+
Trend Micro
+
Banking trojan Dridex uses macros for infection
+
Trend Micro
+
BareBox: efficient malware analysis on bare-metal
+
Annual Computer Security Applications Conference
+
Battling the Rustock threat
+
Microsoft
+
Battling the Zbot threat
+
Microsoft
+
Bitcrypt broken
+
Cassidian Cybersecurity
+
Black Dragon: "... and all will burn beneath the shadow of my wings"
+
Malwageddon
+
BlackEnergy competitor – The 'Darkness' DDoS bot
+
Shadowserver Foundation
+
Blackhole and Cool Exploit kits nearly extinct
+
Threatpost
+
Blackhole exploit kit v2 on the rise
+
Zscaler
+
Blackhole, CVE-2012-0507 and Carberp
+
ESET
+
Bleeding Life Exploit Pack
+
Kahu Security
+
Bot Roast II nets 8 individuals
+
FBI National press office
+
Bot herders build newer versions of previous botnet Waledac
+
SPAMfighter
+
Bot shopping with my wife
+
Panda Labs
+
BoteAR: a “social botnet”- What are we talking about
+
Kaspersky lab
+
Botnet command server hidden in Tor
+
GData
+
Botnet operation disabled
+
FBI
+
Botnet shutdown success story - again: disabling the new Hlux/Kelihos botnet
+
Kaspersky lab
+
Botnet shutdown success story: how Kaspersky Lab disabled the Hlux/Kelihos botnet
+
Kaspersky lab
+
Botnet: classification, attacks, detection, tracing, and preventive measures
+
EURASIP Journal on Wireless Communications and Networking
+
Botnets on discount!
+
GData
+
Boxer SMS trojan: malware as a global service
+
ESET
+
Bredolab botmaster ‘Birdie’ still at large
+
Krebs on Security
+
Bredolab severely injured but not dead
+
FireEye
+
Buh-bye Beebone! Law enforcement kills polymorphic virus-spreading botnet
+
Sophos
+
C
CTB-Locker is back: the web server edition
+
Kaspersky Securelist
+
CVE-2013-1493 (jre17u15 - jre16u41) integrating exploit kits
+
Kafeine
+
CVE-2013-2465/CVE-2013-2471/CVE-2013-2463 integrating Exploit Kits -- jre7u21 CVE- jre6u45 and earlier
+
Malware don't need cofee
+
CVE-2013-5330 (Flash) in an unknown Exploit Kit fed by high rank websites
+
Kafeine
+
CVE-2015-0311 (Flash up to 16.0.0.287) integrating Exploit Kits
+
Malware don't need cofee
+
Carbanak/Anunak in the BlueCoat malware analysis appliance
+
BlueCoat
+
Carbanak: Multi-million dollar cybercrime gang focuses on banks rather than their customers
+
Symantec
+
Carberp + BlackHole = growing fraud incidents
+
ESET
+
Carberp - a modular information stealing trojan
+
Prevx
+
Carberp gang evolution: CARO 2012 presentation
+
ESET
+
Carberp reverse engineering
+
Università Italiana Cracking
+
Carberp steals e-cash vouchers from Facebook users
+
Trusteer
+
Carberp-based trojan attacking SAP
+
Microsoft Malware Protection Centre
+
Carberp-in-the-Mobile
+
Kaspersky lab
+
Carberp: Silent trojan, eventual successor to ZeuS
+
InfoSpyware
+
Carberp: it’s not over yet
+
Kaspersky lab
+
Case study of the Miner botnet
+
4th International Conference on Cyber Con ict
+
Cerber Dominates Ransomware Landscape After Locky's Demise
+
Bleeping Computer
+
Chasing cybercrime: network insights of Dyre and Dridex trojan bankers
+
Blueliv
+
China targets macs used by NGOs
+
F-Secure
+
Cimbot - A technical analysis
+
FireEye
+
Citadel : le fichier de configuration
+
LEXSI
+
Citadel V1.3.5.1: enter the fort’s dungeons
+
RSA
+
Citadel ZeuS bot
+
Cyber Sleuth
+
Citadel plitfi botnet report
+
CERT Polska
+
Citadel trojan malware analysis
+
DELL SecureWorks
+
Citadel trojan touts trouble-ticket system
+
Brian Krebs
+
Citadel: a cyber-criminal’s ultimate weapon?
+
Malwarebytes
+
Clampi/Ligats/Ilomo trojan
+
DELL SecureWorks
+
Collateral damage: Microsoft hits security researchers along with Citadel
+
Abuse.ch
+
Combatting point-of-sale malware
+
Trustwave
+
Conficker working group: lessons learned
+
Conficker working group
+
Confidential documents from Japanese politics stolen by malware
+
Security Affairs
+
Cool exploit kit - URL structure
+
Fort Knox Networks
+
Coordinated DDoS attack during Russian Duma elections
+
Berkman Center
+
Covert channels over social networks
+
SANS Institute
+
Cracking down on botnets
+
Microsoft
+
Cracking into the new P2P variant of Zeusbot/Spyeye
+
Symantec
+
Cracking the encrypted C&C protocol of the ZeroAccess botnet
+
Virus Bulletin
+
Crisis for Windows sneaks onto virtual machines
+
Symantec
+
Critroni crypto ransomware seen using Tor for command and control
+
Kaspersky lab
+
Cross-platform Frutas RAT builder and back door
+
Symantec
+
CryptXXX: new ransomware from the actors behind Reveton, dropping via Angler
+
Proofpoint
+
Crypto experts called on to crack cyberspy tool's encryption
+
UBM
+
CryptoDefense and How Decrypt ransomware information guide and FAQ
+
Bleeping Computer
+
Cutwail drives spike in malicious HTML attachment spam
+
M86 Security Labs
+
Cyber gang seeks botmasters to wage massive wave of trojan attacks against U.S. banks
+
RSA
+
D
DDoS attacks: the Zemra bot
+
Symantec
+
DDoS watch: keeping an eye on Aldi Bot
+
Arbor Networks
+
DGAs and cyber-criminals: a case study
+
Damballa
+
DISCLOSURE: detecting botnet command and control servers through large-scale NetFlow analysis
+
ACSAC
+
DNS: a botnet dialect
+
Iniqua
+
DaRK DDoSseR leads to Gh0st RAT
+
Trend Micro
+
DarkMegi rootkit - sample (distributed via Blackhole)
+
Contagio
+
Darkmegi: this is not the Rootkit you’re looking for
+
McAfee
+
Darkness DDoS bot version identification guide
+
Shadowserver Foundation
+
De code van Dorifel nader bekeken
+
IDG
+
Demystifying Pobelka
+
Fox-IT
+
Department of Justice takes action to disable international botnet
+
US Department of Justice
+
Department of Labor strategic web compromise
+
Crowdstrike
+
Detecting extended attributes (ZeroAccess) and other Frankenstein’s monsters with HMFT
+
Hexacorn
+
Detection and classification of different botnet C&C channels
+
Lehigh University. Bethlehem
+
Dharma Ransomware Uses AV Tool to Distract from Malicious Activities
+
TrendLabs Security Intelligence Blog
+
Digging inside Tinba malware - A walkthrough
+
SecNiche
+
Digging into the Nitol DDoS botnet
+
McAfee
+
Dirt Jumper DDoS bot increasingly popular
+
Arbor Sert
+
Discerning relationships: the Mexican botnet connection
+
Trend Micro
+
Discovered: botnet costing display advertisers over six million dollars per month
+
Spider.io
+
Disorderly conduct: localized malware impersonates the police
+
Microsoft
+
Disttrack malware overwrites files, infects MBR
+
Trend Micro
+
Disttrack sabotage malware wipes data at unnamed Middle East energy organization
+
Wired Business Media
+
Doctor Web a détecté un botnet enrôlant plus de 550 000 Mac
+
Doctor Web
+
Doctor Web exposes 550 000 strong Mac botnet
+
Doctor Web
+
Domain generation algorithms (DGA) in stealthy malware
+
Damballa
+
Dorifel crypto malware paralyzes Dutch companies and public sector
+
Emsisoft
+
Dorifel is much bigger than expected and it’s still active and growing!
+
Kaspersky lab
+
Dorifel virus gereed voor Nederlandse banking phishing
+
Digital Investigation
+
Dorifel/Quervar: the support scammer’s secret weapon
+
ESET
+
Dorkbot: conquistando Latinoamérica
+
ESET
+
Dragonfly Threat Against Western Energy Suppliers
+
Symantec
+
Dridex learns new trick: P2P over HTTP
+
S21sec
+
DroidLive New SMS Android Trojan
+
CS State University
+
Duqu FAQ
+
Kaspersky lab
+
Dutch users served Sinowal for lunch
+
TrendMicro
+
Dyre Banking Trojan
+
DELL SecureWorks
+
E
ESET analyzes first Android file-encrypting, TOR-enabled ransomware
+
ESET
+
EURO Winlocker
+
Xylitol
+
Egypt Finfisher intrusion tools and ethics
+
F-Secure
+
Encyclopedia entry: Win32/Carberp
+
Microsoft Malware Protection Centre
+
Encyclopedia entry: Win32/Conficker
+
Microsoft Malware Protection Centre
+
Encyclopedia entry: Win32/Oderoor
+
Microsoft Malware Protection Centre
+
Equation: the Death Star of malware galaxy
+
Kaspersky Securelist
+
Esthost taken down - Biggest cybercriminal takedown in history
+
Trend Micro
+
Etude sur le fonctionnement du Trojan.Matsnu.1 codant les données des utilisateurs
+
Dr.Web
+
Evolution of Win32Carberp: going deeper
+
ESET
+
Exploring the market for stolen passwords
+
Brian Krebs
+
F
FAQ on Kelihos.B/Hlux.B sinkholing
+
The Honeynet Project
+
FBI shuts down Coreflood botnet, zombies transmitting financial data
+
Ziff Davis Enterprise
+
Fake FBI Ransomware analysis
+
AVG
+
Fast look at Sundown EK
+
Malware don't need cofee
+
Feodo - a new botnet on the rise
+
FireEye
+
Festi botnet analysis & investigation
+
ESET
+
FighterPOS: a new one-man PoS malware campaign
+
Trend Micro
+
File infector Expiro hits US, steals FTP credentials
+
Trend Micro
+
First step in cross-platform Trojan bankers from Brazil done
+
Kaspersky Securelist
+
First widespread virus cross-infection
+
Symantec
+
Five charged in largest hacking scheme ever prosecuted in US
+
SecurityWeek
+
Flame, Duqu and Stuxnet: in-depth code analysis of mssecmgr.ocx
+
ESET
+
Flame: replication via Windows Update MITM proxy
+
Kaspersky lab
+
Flamer analysis: framework reconstruction
+
ESET
+
Flamer: highly sophisticated and discreet threat targets the Middle East
+
Symantec
+
Flamer: urgent suicide
+
Symantec
+
Flashfake Mac OS X botnet confirmed
+
Kaspersky lab
+
Fortiguard: Android/Stiniter.A!tr
+
Fortinet
+
From Georgia, with love Win32/Georbot
+
ESET
+
Full analysis of Flame's Command & Control servers
+
Kaspersky lab
+
Full analysis of Flame's command & control servers
+
Kaspersky lab
+
G
Gamarue dropping Lethic bot
+
Zscaler
+
GandCrab ransomware distributed by RIG and GrandSoft exploit kits
+
Malwarebytes
+
Gangstaservice Winlock Affiliate
+
Xylibox
+
Gauss: Nation-state cyber-surveillance meets banking Trojan
+
Kaspersky lab
+
Gauss: abnormal distribution
+
Kaspersky lab
+
Get gamed and rue the day...
+
Microsoft
+
GingerMaster Android Malware Utilizing A Root Exploit
+
CS State University
+
Going solo: self-propagating ZBOT malware spotted
+
Trend Micro
+
Google Groups trojan
+
Symantec
+
Got malware? Rent an exploit service
+
Damballa
+
Gumblar Google-poisoning attack morphs
+
The Register
+
Guys behind Gauss and Flame are the same
+
FireEye
+
H
HARMUR: storing and analyzing historic data on malicious domains
+
ACM
+
HTran and the Advanced Persistent Threat
+
DELL SecureWorks
+
Hackers are increasingly targeting IoT Devices with Mirai DDoS Malware
+
HackRead
+
Hammertoss: stealthy tactics define a Russian cyber threat group
+
FireEye
+
Harnig botnet: a retreating army
+
FireEye
+
Harnig is back
+
FireEye
+
Harvesting data on the Xarvester botmaster
+
Brian Krebs
+
Have we seen the end of the ZeroAccess botnet?
+
Sophos Labs
+
Hello Neutrino ! (just one more Exploit Kit)
+
Kafeine
+
HerpesNet botnet 1.7
+
Toolzware
+
Hesperbot – A new, advanced banking trojan in the wild
+
ESET
+
Hiding in plain sight: the FAKEM remote access trojan
+
Trend Micro
+
Hiloti: the (bot)master of disguise
+
Fortinet
+
Hodprot: hot to bot
+
ESET
+
How to steal a Botnet and what can happen when you do
+
Google
+
Hébergeurs malhonnêtes : nouvelle fermeture (3FN)
+
Criminalités numériques
+
I
IRC bot for Android
+
Kaspersky lab
+
IcoScript: using webmail to control malware
+
Virus Bulletin
+
Illuminating the Etumbot APT backdoor
+
Arbor Networks
+
Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat
+
RAID 2012
+
Infamous Skynet botnet author allegedly arrested
+
MalwareTech
+
Inside Carberp botnet
+
Malware Intelligence
+
Inside Impact exploit kit
+
Kafeine
+
Inside Pony 1.7 / Fareit C&C - Botnet Control Panel
+
Malware don't need cofee
+
Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control Panel
+
Blogspot
+
Inside an APT campaign with multiple targets in India and Japan
+
Trend Micro
+
Inside the Grum botnet
+
Brian Krebs
+
Inside the world of the Citadel trojan
+
McAfee
+
Insights into Win32/Bradop
+
Microsoft
+
Interconnection of Gauss with Stuxnet, Duqu & Flame
+
ESET
+
International cyber ring that infected millions of computers dismantled
+
FBI
+
It’s 2012 and Armageddon has arrived
+
Arbor SERT
+
It’s not the end of the world: DarkComet misses by a mile
+
Arbor Networks
+
J
Java Runtime Environment 1.7 Zero-Day Exploit Delivers Backdoor
+
Trend Labs
+
Java Zero-Days and the Blackhole Exploit Kit
+
Trend Micro
+
Joint strike force against Dorifel
+
SurfRight
+
K
Kaptoxa point-of-sale compromise
+
ISight Partners
+
Karagny.L unpack
+
Malware.lu
+
Kaspersky Lab et Seculert annoncent la récente découverte de « Madi », une nouvelle attaque de cyberespionnage au Moyen‑Orient
+
Global Security Mag
+
Kaspersky security bulletin 2015. Overall statistics for 2015
+
Kaspersky Securelist
+
Kelihos back in town using Fast Flux
+
Abuse.ch
+
Kelihos botnet appears again with new variant
+
Secure Connexion
+
Kelihos botnet trying to expand by harnessing Russian national sentiments
+
Websense
+
Kelihos is dead. Long live Kelihos
+
Damballa
+
Kelihos is dead… No wait… Long live Kelihos! Again!
+
Trustwave
+
Kelihos/Hlux botnet returns with new techniques
+
Kaspersky lab
+
Kelihos: not alien resurrection, more attack of the clones
+
ESET
+
King of spam:Festi botnet analysis
+
ESET
+
Know your enemy: tracking botnets
+
Honeynet projects
+
Koobface botnet master KrotReal back in business, distributes ransomware and promotes BHSEO service/product
+
Dancho Danchev
+
Koobface, un écosystème cybercriminel ou le conte des Mille et une nuits ?
+
Eric Freyssinet
+
Kore exploit kit
+
Kahu Security
+
Kraken botnet infiltration
+
Tipping Point
+
L
Large-scale analysis of malware downloaders
+
DIMVA
+
Latest Kelihos botnet shut down live at RSA Conference 2013
+
Kaspersky lab
+
Latest SpyEye botnet active and cheaper
+
McAfee
+
Latin American banks under fire from the Mexican VOlk-botnet
+
Kaspersky lab
+
Learning stateful models for network honeypots
+
ACM
+
Legal implications of countering botnets
+
NATO Cooperative Cyber Defence Centre of Excellence
+
Leouncia - Yet another backdoor
+
FireEye
+
Leouncia - Yet another backdoor - Part 2
+
FireEye
+
Library file in certain Android apps connects to C&C servers
+
Trend Micro
+
Lifting the lid on the Redkit exploit kit (Part 1)
+
Sophos Labs
+
Lights Out: Dragonfly is on the move
+
CyActive
+
Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole
+
ESET
+
Locky Ransomware switches to the Lukitus extension for Encrypted Files
+
Bleeping Computer
+
LogPOS - new point of sale malware using mailslots
+
Morphick
+
Long life to Kelihos!
+
Websense
+
Look what I found: it's a Pony!
+
Trustwave
+
M
MDK: the largest mobile botnet in China
+
Symantec
+
MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled
+
Malware Must Die
+
MP-DDoser: A rapidly improving DDoS threat
+
Arbor Sert
+
MP-DDoser:Monitoring a rapidly improving DDoS threat
+
Arbor Sert
+
MSIE 0-day exploit CVE-2014-0322 - Possibly targeting French aerospace association
+
Websense
+
MSRT April 2012: Win32/Claretore
+
Microsoft
+
MSRT April 2014 – Ramdo
+
Microsoft
+
MSRT June '12 - cleanup on aisle one
+
Microsoft
+
MSRT March 2012: breaking bad
+
Microsoft
+
MSRT November '12 - Weelsof around the world
+
Microsoft
+
MSRT September '12 - Medfos, hijacking your daily search
+
Microsoft
+
MSRT march: three hioles in one
+
Microsoft
+
Maazben: best of both worlds
+
M86 Security labs
+
Mac BackDoor.Wirenet.1 config extractor
+
Malware.lu
+
Mac Flashback exploiting unpatched Java vulnerability
+
F-Secure
+
Mac spyware found at Oslo Freedom Forum
+
F-Secure
+
Madi is back - New Tricks and a new Command&Control server
+
Kaspersky lab
+
Mahdi malware finds 150 new targets including U.S. and Germany, gets more evasive
+
Wired Business Media
+
Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-mode
+
Sophos Labs
+
Malicious Apache module injects Iframes
+
Unmask Parasites
+
Malicious Apache module used for content injection: Linux/Chapro.A
+
ESET
+
Malware 2 - from infection to persistence
+
Context
+
Malware Memory Analysis - Volatility
+
Basement PC Tech
+
Malware Uses Google Go Language
+
Symantec
+
Malware analysis Rannoh/Matsnu
+
Malware.lu
+
Malware analysis of the Lurk downloader
+
DELL SecureWorks
+
Malware analysis tutorial 32: exploration of botnet client
+
Dr. Xiang Fu
+
Malware attacking POS systems
+
Hexacorn
+
Malware discovered developed with Google's "Go" programming language
+
Wired Business Media
+
Malware evolving to defeat anti-DDoS services like CloudFlare?
+
ESET
+
Malware for everyone - Aldi Bot at a discount price
+
Heise Media
+
Malware hunting with the Sysinternals tools
+
MSDN
+
Malware pandemics
+
Office of Naval Research
+
Malware targeting Windows 8 uses Google Docs
+
Symantec
+
Mariposa botnet 'mastermind' jailed in Slovenia
+
BBC
+
Massive Drop in number of active Zeus C&C servers
+
Abuse.ch
+
Massive search fraud botnet seized by Microsoft and Symantec
+
Condé Nast
+
Mastermind behind Gozi bank malware charged along with two others
+
Condé Nast
+
McAfee Labs threat advisory : W32.Pinkslipbot
+
McAfee
+
Measuring and detecting Fast-Flux service networks
+
University of Mannheim & Fraunhofer FIRST
+
Measuring and detecting malware downloads in live network traffic
+
ESORICS
+
Measuring botnet populations
+
Arbor Sert
+
Meet "Red Dot exploit toolkit"
+
Malware don't need cofee
+
Meet CritXPack (Previously Vintage Pack)
+
Kafeine
+
Meet ProPack Exploit Pack - yes that's a lot of pack
+
Blogspot
+
Members of the largest criminal group engaged in online banking fraud are detained
+
Group-IB
+
Mexican Twitter-controlled botnet unpicked
+
The Register
+
Microsoft and Symantec take down Bamital botnet that hijacks online searches
+
Microsoft
+
Microsoft and financial services industry leaders target cybercriminal operations from ZeuS botnets
+
Microsoft
+
Microsoft disrupts the emerging Nitol botnet being spread through an unsecure supply chain
+
Microsoft
+
Microsoft neutralizes Kelihos botnet, names defendant in case
+
Microsoft
+
Microsoft partners with Interpol, industry to disrupt global malware attack affecting more than 770,000 PCs in past six months
+
Microsoft
+
Microsoft security updates January 2016
+
Kaspersky Securelist
+
Miniduke
+
CrySyS Lab
+
MoVP 1.3 Desktops, heaps, and ransomware
+
Volatility labs
+
Mocbot spam analysis
+
DELL SecureWorks
+
Monkif botnet hides commands in JPEGs
+
McAfee Labs
+
More Flame/Skywiper CNC behavior uncovered
+
FireEye
+
More details of the Dorifel servers
+
Rickey Gevers
+
Morto worm sets a (DNS) record
+
Symantec
+
Mpack installs ultra-invisible trojan
+
International Data Group
+
Multitenancy Botnets thwart threat analysis
+
Open-Source Security Tools
+
Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication
+
ESET
+
N
NASK shuts down dangerous Virut botnet domains
+
CERT Polska
+
NGRBot spreads via chat
+
McAfee
+
Necurs Quick Analysis
+
Malware.lu
+
Neosploit gets Java 0-Day
+
Kahu Security
+
Nepalese government websites compromised to serve Zegost RAT
+
Websense
+
NetTraveler APT gets a makeover for 10th birthday
+
Kaspersky lab
+
NetTraveler is back: the 'Red Star' APT returns with new tricks
+
Kaspersky lab
+
New Apple Mac trojan called OSX/Crisis discovered
+
Intego
+
New Chinese exploit pack
+
Kahu security blog
+
New CryptoLocker spreads via removable drives
+
Trend Micro
+
New Duqu sample found in the wild
+
Symantec
+
New GamaPoS malware piggybacks on Andromeda botnet; spreads in 13 US states
+
Trend Micro
+
New IE Zero-Day used in targeted attacks
+
Symantec
+
New IceIX (ZeuS variant) changes its encryption method (again)
+
TrustDefender Labs
+
New Mac malware discovered on attendee computer at anti-surveillance workshop
+
Kaspersky lab
+
New Mahdi updates, new C2 server
+
Seculert
+
New POS malware emerges - Punkey
+
Trustwave
+
New PoS malware “Backoff” targets US
+
Trend Micro
+
New RATs emerge from leaked Njw0rm source code
+
Trend Labs
+
New Thor botnet nearly ready to be sold, price $8,000
+
SPAMfighter
+
New Xtreme RAT attacks US, Israel, and other foreign governments
+
Trend Micro
+
New crimeware attacks LatAm bank users
+
Kaspersky lab
+
New crypto-ransomware JIGSAW plays nasty games
+
TrendLabs Security Intelligence Blog
+
New crypto-ransomware emerge in the wild
+
Trend Micro
+
New point-of-sale malware distributed by Andromeda botnet
+
CIO IDG News
+
New ransomware plays its victims an audio file, over and over and over…
+
Trend Micro
+
New trojan found: Admin.HLP leaks organizations data
+
ERT Threat Alert
+
New virus SMSZombie.A discovered by TrustGo Security Labs
+
TrustGo
+
NewPosThings has new PoS things
+
TrendLabs Security Intelligence Blog
+
Newly detected Crisis virus infects Windows, Macs and virtual machines
+
Ziff Davis
+
Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilities
+
Webroot
+
Ngrbot steals information and mine Bitcoins
+
SonicWALL
+
NitlovePOS: another new POS malware
+
FireEye
+
Nitol DDoS botnet discovered in China
+
Reed Exhibitions
+
NjRAT & H-Worm variant infections continue to rise
+
Zscaler
+
Not just a one-trick PonyDOS
+
Arbor SERT
+
Now you Z-(eus) it, now you don’t: ZeuS bots silently upgraded to Citadel
+
RSA
+
Nymaim - obfuscation chronicles
+
ESET
+
O
OSX Kitmos analysis
+
Steeve Barbeau
+
OSX.Iservice technical details
+
Symantec
+
OSX.iService its not going to iWork for you
+
Symantec
+
OSX/Crisis has been used as part of a targeted attack
+
Intego
+
OSX/Flashback - The first malware to infect hundreds of thousands of Apple Mac
+
ESET
+
Obama order sped up wave of cyberattacks against Iran
+
The New York Times
+
Olmasco bootkit: next circle of TDL4 evolution (or not)
+
Eset
+
On botnets that use DNS for command and control
+
Institute for Internet Security University of Applied Sciences Gelsenkirchen Gelsenkirchen, Germany
+
One Sinowal trojan + one gang = hundreds of thousands of compromised accountS
+
RSA
+
One bot to rule them all
+
Panda Security
+
One-man PoS malware operation captures 22,000 credit card details in Brazil
+
TrendLabs Security Intelligence Blog
+
Operation Bot Roast II
+
FBI
+
Operation SnowMan: DeputyDog actor compromises US veterans of foreign wars website
+
FireEye
+
Operation Socialist The Inside Story Of How British Spies Hacked Belgium’s Largest Telco
+
The Intercept
+
OphionLocker: Joining in the Ransomware Race
+
F-Secure
+
Over 9 million PCs infected - ZeroAccess botnet uncovered
+
Sophos Labs
+
Overcoming reputation and proof-of-work systems in botnets
+
IEEE
+
Overview: inside the ZeuS trojan’s source code
+
The Tech Herald
+
Owning Kraken zombies
+
Tipping Point
+
P
PETYA crypto-ransomware overwrites MBR to lock users out of their computers
+
TrendLabs Security Intelligence Blog
+
Panda Security uncovers bot-killing malware
+
Wired Business Media
+
Panel Gendarmerie
+
Malekal
+
Panel Supern0va et virus gendarmerie
+
Malekal Morte
+
Panel Virus Gendarmerie : Ratio 0.36%
+
Malekal
+
Part virus, part botnet, spreading fast: Ramnit moves past Facebook passwords
+
Arstechnica
+
Peer-to-peer botnets: overview and case study
+
Usenix
+
PeerRush: mining for unwanted P2P traffic
+
Conference on Detection of Intrusions and Malware & Vulnerability Assessment
+
Petya ransomware skips the files and encrypts your hard drive instead
+
Bleeping Computer
+
Pitou, The “silent” resurrection of the PITOU notorious Srizbi kernel spambot
+
F-Secure
+
Playing cops & robbers with banks & browsers
+
Symantec
+
PlugX malware: A good hacker is an apologetic hacker
+
Kaspersky Securelist
+
PlugX: new tool for a not so new campaign
+
Trend Micro
+
PlugX: some uncovered points
+
Cassidian Cybersecurity
+
Poison Ivy 2.3.0 Documentation
+
PoisonIvy
+
Poison Ivy: assessing damage and extracting intelligence
+
FireEye
+
PoisonIvy adapts to communicate through authentication proxies
+
JPCERT-CC
+
Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware
+
Sophos
+
PokerAgent botnet stealing over 16,000 Facebook credentials
+
ESET
+
Police Trojan crosses the Atlantic, now targets USA and Canada
+
TrendMicro
+
Post-mortem of a zombie: Conficker cleanup after six years
+
24th USENIX Security Symposium
+
Pramro and Sality - two PEs in a pod
+
Microsoft
+
Proactive detection of network security incidents
+
Enisa
+
Proactive detection of security incidents II - Honeypots
+
Enisa
+
Proactive policy measures by Internet service providers against Botnets
+
OECD
+
Probing the Gozi-Prinimalka campaign
+
Trend Micro
+
Pushdo botnet gets DGA update, over 6,000 machines host new variant
+
Haymarket Media, Inc
+
Q
Qadars: un nouveau malware bancaire avec un composant mobile
+
LEXSI
+
Quervar – Induc.C reincarnate
+
Eset
+
R
REVETON Ransomware Spreads with Old Tactics, New Infection Method
+
Trend Labs
+
REvil ransomware gang's web sites mysteriously shut down
+
Bleeping Computer
+
RIG exploit kit strikes oil
+
CISCO
+
Ramnit goes social
+
Seculert
+
Ransomware : la sulfureuse hypothèse sur la situation chez Norsk Hydro
+
ZDNet
+
Ransomware Fake Microsoft Security Essentials
+
Malekal Morte
+
Ransomware and Silence Locker control panel
+
Symantec
+
Ransomware crimeware kits
+
Symantec
+
Ransomware gets professional, targeting Switzerland, Germany and Austria
+
Abuse.ch
+
Ransomware or Wiper? LockerGoga Straddles the Line
+
Cisco Talos Intelligence
+
Ransomware report: the rise of BandarChor
+
F-Secure
+
Ransomware « Trojan.Casier » Panel
+
Malekal
+
Ransomware ‘Holds Up’ victims
+
McAfee
+
Ransomware: playing on your fears
+
Microsoft
+
Relentless Zbot and anti-emulations
+
Symantec
+
Research Win32/Slenfbot
+
Microsoft
+
Reversing Andromeda-Gamarue botnet
+
Garage 4 Hackers
+
Reversing the wrath of Khan
+
Arbor SERT
+
Reveton.A
+
Microsoft
+
Richard Clarke on who was behind the Stuxnet attack
+
Smithsonian
+
Rmnet.12 created a million Windows computer botnet
+
DrWeb
+
RootSmart Android malware
+
InfoSec Institute
+
RootSmart malware utilizes GingerBreak root exploit
+
CS State University
+
Rovnix Reloaded: new step of evolution
+
ESET
+
Rovnix bootkit framework updated
+
ESET
+
Rovnix.D: the code injection story
+
ESET
+
Russian service online to check the detection of malware
+
Malware Intelligence
+
Réflexions pour un plan d'action contre les botnets
+
SSTIC
+
S
SDBot IRC botnet continues to make waves
+
Trend Micro
+
SIM-ple: mobile handsets are weak link in latest online banking fraud scheme
+
Trusteer
+
SIRv12
+
Microsoft
+
SIRv12: the obstinacy of Conficker
+
Microsoft Malware Protection Centre
+
SKyWIper: A complex malware for targeted attacks
+
CrySyS Lab
+
SamSam Ransomware Evolves Its Tactics Towards Targeting Whole Companies
+
Threatpost
+
SamSam ransomware designed to inundate targeted networks with thousands of copies of itself
+
SC Magazine
+
Saudi Aramco hit by computer virus
+
Guardian News and Media Limited
+
Say hello to Tinba: world’s smallest trojan-banker
+
CSIS
+
Scareware locks down computer due to child porn and terrorism
+
Abuse.ch
+
Secrets of the Comfoo masters
+
DELL SecureWorks
+
Security Response Android.Counterclank
+
Symantec
+
Security alert: SpamSoldier
+
Lookout
+
Security alert: new Android malware - TigerBot - identified in alternative markets
+
NQ Mobile
+
Security alert: new TGLoader Android malware utilizes the exploid root exploit
+
NC State University
+
Security alert: new variants of Legacy Native (LeNa) identified
+
Lookout
+
Security experts detected new Twitter-controlled botnet
+
Spamfighter
+
Navigation menu
Personal tools
Log in
Namespaces
Property
Discussion
Variants
Views
Read
View source
View history
More
Search
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Upload file
Special pages
Printable version
Permanent link
Page information
Browse properties