Property:Editor
From Botnets.fr
Jump to navigation
Jump to search
This is a property of type
Page
. Default form:
Editor
.
Usage
715
previous 500
20
50
100
250
500
next 500
Filter
<p>The <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Help:Property_page/Filter">search filter</a> allows the inclusion of <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Help:Query_expressions">query expressions</a> such as <code>~</code> or <code>!</code>. The selected <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Query_engine">query engine</a> might also support case insensitive matching or other short expressions like:</p><ul><li><code>in:</code> result should include the term, e.g. '<code>in:Foo</code>'</li></ul><ul><li><code>not:</code> result should to not include the term, e.g. '<code>not:Bar</code>'</li></ul>
Showing 215 pages using this property.
S
Shamoon the Wiper in details
+
Kaspersky lab
+
Shamoon the Wiper: further details (Part II)
+
Kaspersky lab
+
Shamoon the wiper - copycats at work
+
Kaspersky lab
+
Shedding light on the NeoSploit Exploit Kit
+
M86SecurityLabs
+
Shylock financial malware back 'with a vengeance'
+
CSO Online
+
Sinowal analysis (Windows 7, 32-bit)
+
Evild3ad.com
+
Sinowal: MBR rootkit never dies! (and it always brings some new clever features)
+
ITsec
+
Sinowal: the evolution of MBR rootkit continues
+
PrevX Labs
+
Skunkx DDoS bot analysis
+
Arbor Networks
+
Skynet, a Tor-powered botnet straight from Reddit
+
Rapid7
+
Smartcard vulnerabilities in modern banking malware
+
ESET
+
Social networks – A bonanza for cybercriminals
+
Kaspersky Securelist
+
Sony PlayStation's site SQL injected, redirecting to rogue security software
+
Zdnet
+
Sony/Destover: mystery North Korean actor’s destructive and past network activity
+
Kaspersky Securelist
+
Sopelka Botnet: three banking trojans and one banking panel
+
S21sec
+
Source Code for IoT Botnet ‘Mirai’ Released
+
Krebs on Security
+
Spam botnets: The fall of Grum and the rise of Festi
+
Spamhaus
+
Spambot evolution 2011
+
DELL SecureWorks
+
Spread of Darkness...Details on the public release of the Darkness DDoS bot
+
Shadowserver Foundation
+
SpyEye being kicked to the curb by its customers?
+
Damballa
+
Stamp EK (aka SofosFO) now showing "Blackhole 2.0 Like" landing pages
+
Kafeine
+
Stealing money from ATMs with malware
+
CCC 30C3
+
Stealthy peer-to-peer C&C over SMB pipes
+
Strategic Cyber LLC
+
Stealthy router-based botnet worm squirming
+
ZDNet
+
Step-by-step reverse engineering malware: ZeroAccess / Max++ / Smiscer crimeware rootkit
+
Infosec Institute
+
Stolen passwords allowed hackers to steal over one billion rubles
+
Duo security
+
Study of malware obfuscation techniques
+
HITBSecConf
+
Survey on network-based botnet detection methods
+
John Wiley & Sons, Ltd.
+
Symantec/Android.Ackposts
+
Symantec
+
Symantec/Android.Maistealer
+
Symantec
+
Symantec/Backdoor.Arcomrat
+
Symantec
+
Symantec/W32.Zorenium
+
Symantec
+
T
TDI - a new element in old TDSS story
+
Artem I. Baranov
+
TDL3 : The rootkit of all evil
+
ESET
+
TDL4 - Top Bot
+
Kaspersky lab
+
TDL4 reloaded: Purple Haze all in my brain
+
ESET
+
TDSS botnet: full disclosure
+
Esage Lab
+
TR-24 analysis - Destory RAT family
+
CIRCL
+
Takeover of Virut domains
+
CERT Polska
+
Taking down botnets: Microsoft and the Rustock botnet
+
Microsoft
+
Tales from Crisis, Chapter 1: The dropper’s box of tricks
+
Osxreverser
+
Tales from Crisis, Chapter 2: Backdoor’s first steps
+
Osxreverser
+
Tales from Crisis, Chapter 3: The Italian rootkit job
+
Osxreverser
+
Tales from Crisis, Chapter 4: a ghost in the network
+
Osxreverser
+
Targeted attacks and Ukraine
+
F-Secure
+
Targeted destructive malware explained: Troj/Mdrop-ELD
+
Sophos Labs
+
Targeted information stealing attacks in South Asia use email, signed binaries
+
ESET
+
Tatanga attack exposes chipTAN weaknesses
+
Trusteer
+
Tatanga: a new banking trojan with MitB functions
+
S21sec
+
Tequila botnet leads to phishing attack
+
Trend Micro
+
The "Red October" campaign - An advanced cyber espionage network targeting diplomatic and government agencies
+
Kaspersky lab
+
The 'Penquin' Turla
+
Kaspersky Securelist
+
The ACCDFISA malware family – Ransomware targeting Windows servers
+
Emsisoft
+
The ACCDFISA malware family – Ransomware targetting Windows servers
+
Emsisoft Lab
+
The Andromeda/Gamarue botnet is on the rise again
+
GData
+
The Coreflood report
+
DELL SecureWorks
+
The Cridex trojan targets 137 financial organizations in one go
+
M86 Security Labs
+
The DGA of Symmi
+
Johannes Bader
+
The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements
+
Internet Measurement Conference
+
The Dorkbot rises
+
Trend Micro
+
The Elderwood project (infographic)
+
Symantec
+
The Epic Turla operation
+
Kaspersky lab
+
The Flame: questions and answers
+
Kaspersky lab
+
The IMDDOS botnet: discovery and analysis
+
Damballa
+
The Madi campaign - Part II
+
Kaspersky lab
+
The Miner botnet: Bitcoin mining goes peer-to-peer
+
Kaspersky Securelist
+
The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoor
+
Kaspersky lab
+
The Mirage campaign
+
DELL SecureWorks
+
The Pobelka botnet - a command and control case study
+
Digital Investigation
+
The Sality botnet
+
Symantec
+
The Target breach by the numbers
+
Krebs on Security
+
The Waledac protocol: the how and why
+
Malicious and Unwanted Software (MALWARE)
+
The ZeroAccess botnet revealed
+
Infosec Institute
+
The ZeroAccess botnet: mining and fraud for massive financial gain
+
Sophos Labs
+
The ZeroAccess rootkit
+
Sophos
+
The anatomy of a botnet
+
Arbor SERT
+
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet
+
Annual Computer Security Applications Conference
+
The case of TDL3
+
F-Secure
+
The evolution of TDL: conquering x64
+
ESET
+
The evolution of webinjects
+
Virus Bulletin
+
The first trojan in history to steal Linux and Mac OS X passwords
+
Dr.Web
+
The good , the bad and the unknown online scanners
+
ISC
+
The graphic design of "Maktub Locker" ransomware
+
F-Secure
+
The growing threat to business banking online
+
Washington Post
+
The life cycle of web server botnet recruitment
+
Trustwave
+
The lifecycle of peer-to-peer (Gameover) ZeuS
+
DELL SecureWorks
+
The most sophisticated Android trojan
+
Kaspersky lab
+
The mystery of Duqu framework solved
+
Kaspersky lab
+
The mystery of Duqu: part five
+
Kaspersky lab
+
The mystery of Duqu: part one
+
Kaspersky lab
+
The mystery of Duqu: part six (the command and control servers)
+
Kaspersky lab
+
The mystery of Duqu: part ten
+
Kaspersky lab
+
The mystery of Duqu: part three
+
Kaspersky lab
+
The mystery of Duqu: part two
+
Kaspersky lab
+
The mystery of the Duqu framework
+
Kaspersky lab
+
The new era of botnets
+
McAfee Labs
+
The real face of Koobface: the largest web 2.0 botnet explained
+
Trend Micro
+
The resurrection of RedKit
+
Kahu Security
+
The rise of TOR-based botnets
+
ESET
+
The tigger trojan: icky, sticky stuff
+
Washington Post
+
The underground economy of spam: a botmaster's perspective of coordinating large-scale spam campaigns
+
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
+
The where and why of Hlux
+
Kaspersky lab
+
The world's biggest botnets
+
Darkreading
+
The ‘Madi’ infostealers - a detailed analysis
+
Kaspersky lab
+
The ‘advertising’ botnet
+
Kaspersky lab
+
The “Hikit” rootkit: advanced and persistent attack techniques (part 1)
+
Mandiant
+
The “Hikit” rootkit: advanced and persistent attack techniques (part 2)
+
Mandiant
+
Threat spotlight: Angler lurking in the domain shadows
+
CISCO
+
Three month FrameworkPOS malware campaign nabs ~43,000 credit cards from point of sale systems
+
Anomali
+
Tilon-son of Silon
+
Trusteer
+
Tilon/SpyEye2 intelligence report
+
Fox-IT
+
TinyNuke may be a ticking time bomb
+
McAfee
+
Tis the season for shipping and phishing
+
Kaspersky Securelist
+
Top 50 bad hosts & networks 2011 Q4
+
HostExploit
+
Top spam botnets exposed
+
DELL SecureWorks
+
Torpig - Back to the future or how the most sophisticated trojan in 2008 reinvents itself
+
Andreas Baumhof
+
TorrentLocker ransomware uses email authentication to refine spam runs
+
TrendLabs Security Intelligence Blog
+
Tracking down the author of the PlugX RAT
+
Alienvault
+
Traffic direction systems as malware distribution tools
+
Trend Micro
+
Travnet botnet steals huge amount of sensitive data
+
McAfee
+
Travnet trojan could be part of APT campaign
+
McAfee
+
TreasureHunt: a custom POS malware tool
+
FireEye
+
Trend Micro discovers MalumPoS; malware targeting hotels and other US industries
+
Trend Micro
+
Trojan ChePro, the CPL storm
+
Kaspersky Securelist
+
Trojan Nap aka Kelihos/Hlux - Feb. 2013 status update
+
DeepEnd Research
+
Trojan downloaders on the rise: don’t let Locky or TeslaCrypt ruin your day
+
ESET Welivesecurity
+
Trojan horse using sender policy framework
+
Symantec
+
Trojan moves its configuration to Twitter, LinkedIn, MSDN and Baidu
+
Norman
+
Trojan on the loose: an in-depth analysis of police trojan
+
Trend Micro
+
Trojan.Prinimalka: bits and pieces
+
Arbor Networks
+
Trojan.Ransomgerpo criminal arrested
+
Symantec
+
Trojan.Taidoor takes aim at policy think tanks
+
Symantec
+
Trojan.Tatanarg.B careful!
+
Symantec
+
Trojan.Whitewell: what’s your (bot) Facebook status today?
+
Symantec
+
Trojan.ZeroAccess infection analysis
+
Symantec
+
Trusteer warns of new two headed trojan attack against online banks
+
Trusteer
+
Twitter + Pastebin = malware update
+
Symantec
+
U
Un WOMBAT pour évaluer la cybercriminalité
+
SSTIC
+
Under the hood of Carberp: Malware & configuration analysis
+
Trusteer
+
Under the hood of the cyber attack on U.S. banks
+
Incapsula
+
Unexpected reboot: Necurs
+
Microsoft
+
Unveiling an Indian cyberattack infrastructure - a special report
+
Norman
+
Unveiling the network criminal infrastructure of TDSS/TDL4 - DGAv14: a case study on a new TDSS/TDL4 variant
+
Damballa
+
Upas Kit (aka Rombrast) integrates webinjects
+
Blogspot
+
Upatre, Dyre used in Univ. of Florida attack
+
SC Magazine
+
Updated Sundown Exploit Kit Uses Steganography
+
TrendLabs Security Intelligence Blog
+
Urausy improving its localization - A (the\?) Gaelic Ransomware with Interpol impersonation as default landing
+
Blogspot
+
Urausy ransomware - July 2013 design refresh - "Summer 2013 collection"
+
Kafeine
+
Urausy: Colorfull design refresh (+HR) & EC3 Logo
+
Kafeine
+
V
VOlk-botnet takes over Latin America
+
Softpedia
+
Vawtrak gains momentum and expands targets
+
PhishLabs
+
Versatile and infectious: Win64/Expiro is a cross-platform file infector
+
ESET
+
VinSelf - A new backdoor in town
+
FireEye
+
ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar
+
Lookout
+
Virus Gendarmerie : variante Office Centrale de Luttre contre la criminalité – controle informationnel
+
Malekal
+
Virus scanners for virus authors
+
Krebs on Security
+
Virus scanners for virus authors, part II
+
Krebs on Security
+
Virut malware fuels Waledac botnet resurgence
+
Haymarket Media, Inc
+
W
W32.Changeup: how the worm was created
+
Symantec
+
W32.Duqu, the precursor to the next Stuxnet
+
Symantec
+
W32.Flamer: spreading mechanism tricks and exploits
+
Symantec
+
W32.Qakbot in detail
+
Symantec
+
W32.Shadesrat (Blackshades) author arrested
+
Symantec
+
W32.Stuxnet dossier
+
Symantec
+
W32.Tinba (Tinybanker) The turkish incident
+
Trend Micro
+
W32.Xpaj.B: making easy money from complex code
+
Symantec
+
Waledac Botnet - Deployment and Communication Analysis
+
Fortinet
+
Waledac gets cozy with Virut
+
Symantec
+
Walking through Win32/Jabberbot.A instant messaging C&C
+
ESET
+
Watch out for CoreBot, new stealer in the wild
+
Security Intelligence
+
Weelsof use SSL C&C
+
Xylitol
+
What was that Wiper thing?
+
Kaspersky lab
+
What’s the buzz with Bafruz
+
Microsoft
+
Where Are They Today? Cybercrime Trojans That No One Misses: Shifu Malware
+
Security Intelligence
+
Who's behind the world's largest spam botnet?
+
Brian Krebs
+
Why forums? An empirical analysis into the facilitating factors of carding forums
+
WebSci '13 Proceedings of the 5th Annual ACM Web Science Conference
+
Win32/64:Napolar: New trojan shines on the cyber crime-scene
+
Avast
+
Win32/Gataka - or should we say Zutick?
+
ESET
+
Win32/Gataka banking Trojan - Detailed analysis
+
ESET
+
Win32/Gataka: a banking Trojan ready to take off
+
ESET
+
Win32/Sality newest component: a router’s primary DNS changer named Win32/RBrute
+
ESET
+
Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems
+
ESET
+
Win32/Virlock: First Self-Reproducing Ransomware is also a Shape Shifter
+
ESET Welivesecurity
+
Win32/Vundo
+
Microsoft
+
Winlock affiliate
+
Xylitol
+
Wire Transfer Spam Spreads Upatre
+
Microsoft malware protection centre
+
Worm:VBS/Jenxcus
+
Microsoft
+
X
XPAJ: reversing a Windows x64 bootkit
+
Kaspersky lab
+
Xarvester, the new Srizbi?
+
M86 Security Labs
+
Xpaj Botnet intercepts up to 87 million searches per year
+
Symantec
+
Y
You can’t be invulnerable, but you can be well protected
+
Kaspersky Securelist
+
You dirty RAT! Part 1 – DarkComet
+
Malwarebytes
+
You dirty RAT! part 2 – BlackShades NET
+
Malwarebytes
+
Your botnet is my botnet: analysis of a botnet takeover
+
Department of Computer Science, University of California, Santa Barbara
+
Your files are encrypted with a “Windows 10 Upgrade”
+
CISCO
+
Z
ZACCESS/SIREFEF arrives with new infection technique
+
Trend Micro
+
ZeroAccess - new steps in evolution
+
Artem Baranov
+
ZeroAccess anti-debug uses debugger
+
Malwarebytes
+
ZeroAccess rootkit launched by signed installers
+
McAfee
+
ZeroAccess's way of self-deletion
+
F-Secure
+
ZeroAccess: code injection chronicles
+
ESET
+
ZeroLocker won't come to your rescue
+
Kaspersky lab
+
Zeroing in on malware propagation methods
+
Microsoft
+
ZeuS Gameover overview
+
Minded Security Research Lab
+
ZeuS ransomware feature: win unlock
+
F-Secure
+
ZeuS v2 Malware Analysis - Part II
+
System Forensics
+
ZeuS – P2P+DGA variant – mapping out and understanding the threat
+
CERT Polska
+
ZeuS-P2P monitoring and analysis
+
CERT Polska
+
ZeuS: me talk pretty Finnish one day
+
F-Secure
+
ZeuSbot/Spyeye P2P updated, fortifying the botnet
+
Symantec
+
Zeus variant Floki bot targets PoS data
+
Threatpost
+
Zorenium bot not half the threat it claims to be
+
Symantec
+
‘
‘Dexter’ virus targets point-of-sale terminals
+
Postmedia Network Inc.
+
‘Project Blitzkrieg’ promises more aggressive cyberheists against U.S. banks
+
Brian Krebs
+
“
“Nemanja” botnet identified by IntelCrawler – Over a thousand point-of-sales, grocery management and accounting systems are compromised all over the world
+
IntelCrawler
+
Navigation menu
Personal tools
Log in
Namespaces
Property
Discussion
Variants
Views
Read
View source
View history
More
Search
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Upload file
Special pages
Printable version
Permanent link
Page information
Browse properties