Property:Link
From Botnets.fr
Jump to navigation
Jump to search
This is a property of type
URL
.
Usage
807
previous 100
20
50
100
250
500
next 100
Filter
<p>The <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Help:Property_page/Filter">search filter</a> allows the inclusion of <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Help:Query_expressions">query expressions</a> such as <code>~</code> or <code>!</code>. The selected <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Query_engine">query engine</a> might also support case insensitive matching or other short expressions like:</p><ul><li><code>in:</code> result should include the term, e.g. '<code>in:Foo</code>'</li></ul><ul><li><code>not:</code> result should to not include the term, e.g. '<code>not:Bar</code>'</li></ul>
Showing 100 pages using this property.
D
Discerning relationships: the Mexican botnet connection
+
http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp discerning-relationships mexican-botnet.pdf
+
Discovered: botnet costing display advertisers over six million dollars per month
+
http://www.spider.io/blog/2013/03/chameleon-botnet www.spider.io
+
Disorderly conduct: localized malware impersonates the police
+
http://blogs.technet.com/b/mmpc/archive/2011/12/19/disorderly-conduct-localized-malware-impersonates-the-police.aspx
+
Disttrack malware overwrites files, infects MBR
+
http://blog.trendmicro.com/disttrack-malware-overwrites-files-infects-mbr
+
Disttrack sabotage malware wipes data at unnamed Middle East energy organization
+
http://www.securityweek.com/disttrack-sabotage-malware-wipes-data-unnamed-middle-east-energy-organization
+
Doctor Web a détecté un botnet enrôlant plus de 550 000 Mac
+
http://news.drweb.fr/?i=611&c=4&lng=fr&p=0 news.drweb.fr
+
Doctor Web exposes 550 000 strong Mac botnet
+
http://news.drweb.com/show/?i=2341
+
Domain generation algorithms (DGA) in stealthy malware
+
http://blog.damballa.com/?p=1504 blog.damballa.com
+
Dorifel crypto malware paralyzes Dutch companies and public sector
+
http://blog.emsisoft.com/2012/08/09/dorifel-crypto-malware-paralyzes-dutch-companies-and-public-sector/ blog.emsisoft.com
+
Dorifel is much bigger than expected and it’s still active and growing!
+
https://securelist.com/blog/incidents/33898/dorifel-is-much-bigger-than-expected-and-its-still-active-and-growing/
+
Dorifel virus gereed voor Nederlandse banking phishing
+
http://www.digital-investigation.eu/nieuws/14/dorifel-virus-gereed-voor-nederlandse-banking-phishing.html www.digital-investigation.eu
+
Dorifel/Quervar: the support scammer’s secret weapon
+
http://blog.eset.com/2012/08/11/dorifelquervar-the-support-scammers-secret-weapon blog.eset.com
+
Dorkbot: conquistando Latinoamérica
+
http://www.eset-la.com/pdf/prensa/informe/dorkbot conquistando latinoamerica.pdf www.eset-la.com
+
Dragonfly Threat Against Western Energy Suppliers
+
http://www.symantec.com/connect/blogs/emerging-threat-dragonfly-energetic-bear-apt-group
+
Dridex learns new trick: P2P over HTTP
+
http://securityblog.s21sec.com/2014/11/dridex-learns-new-trick-P2P-over-http.html
+
DroidLive New SMS Android Trojan
+
http://www.csc.ncsu.edu/faculty/jiang/DroidLive/
+
Duqu FAQ
+
http://www.securelist.com/en/blog/208193178/Duqu FAQ
+
Dutch users served Sinowal for lunch
+
http://blog.trendmicro.com/dutch-users-served-sinowal-for-lunch/
+
Dyre Banking Trojan
+
http://www.secureworks.com/cyber-threat-intelligence/threats/dyre-banking-trojan/
+
E
ESET Welivesecurity
+
http://www.welivesecurity.com/
+
ESET analyzes first Android file-encrypting, TOR-enabled ransomware
+
http://www.welivesecurity.com/2014/06/04/simplocker/
+
EURO Winlocker
+
http://www.xylibox.com/2012/08/euro-winlocker.html
+
Egypt Finfisher intrusion tools and ethics
+
http://www.f-secure.com/weblog/archives/00002114.html
+
Emerging attack vectors - RSA slide deck
+
http://pen-testing.sans.org/blog/2012/03/07/emerging-attack-vectors-rsa-slide-deck pen-testing.sans.org
+
Encyclopedia entry: Win32/Carberp
+
http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Win32/Carberp
+
Encyclopedia entry: Win32/Conficker
+
http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?name=Win32/Conficker
+
Encyclopedia entry: Win32/Oderoor
+
http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?name=Win32/Oderoor
+
Equation: the Death Star of malware galaxy
+
https://securelist.com/blog/research/68750/equation-the-death-star-of-malware-galaxy/
+
Esage Lab
+
http://esagelab.com/
+
Esthost taken down - Biggest cybercriminal takedown in history
+
http://blog.trendmicro.com/?p=38093
+
Etude sur le fonctionnement du Trojan.Matsnu.1 codant les données des utilisateurs
+
http://news.drweb.fr/show/?i=641&c=8 news.drweb.fr
+
Evolution of Win32Carberp: going deeper
+
http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper blog.eset.com
+
Exploring the market for stolen passwords
+
http://krebsonsecurity.com/2012/12/exploring-the-market-for-stolen-passwords/
+
F
F-Secure has discovered MiniDuke malware samples in the wild
+
http://securityaffairs.co/wordpress/23658/cyber-crime/f-secure-new-miniduke-atp.html
+
FAQ on Kelihos.B/Hlux.B sinkholing
+
http://www.honeynet.org/node/836 www.honeynet.org
+
FBI ransomware now targeting Apple’s Mac OS X users
+
http://blog.malwarebytes.org/intelligence/2013/07/fbi-ransomware-now-targeting-apples-mac-os-x-users/
+
FBI shuts down Coreflood botnet, zombies transmitting financial data
+
http://www.eweek.com/c/a/Security/FBI-Shuts-Down-Coreflood-Botnet-Zombies-Transmitting-Financial-Data-767165/
+
Fake FBI Ransomware analysis
+
http://blogs.avg.com/news-threats/fake-fbi-ransomware-analysis/
+
Fast look at Sundown EK
+
http://malware.dontneedcoffee.com/2015/06/fast-look-at-sundown-ek.html
+
Fast look at an infection by a Blackhole Exploit Kit 2.0
+
http://malware.dontneedcoffee.com/2012/09/BHEK2.0landing.html
+
Feodo - a new botnet on the rise
+
http://blog.fireeye.com/research/2010/10/feodosoff-a-new-botnet-on-the-rise.html
+
Festi botnet analysis & investigation
+
http://go.eset.com/us/resources/white-papers/AVAR2012 pdf.pdf go.eset.com
+
FighterPOS: a new one-man PoS malware campaign
+
http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/fighterpos-one-man-pos-malware-campaign
+
File infector Expiro hits US, steals FTP credentials
+
http://blog.trendmicro.com/trendlabs-security-intelligence/file-infector-expiro-hits-us-steals-ftp-credentials/
+
FireEye
+
https://www.fireeye.com
+
First step in cross-platform Trojan bankers from Brazil done
+
https://securelist.com/blog/research/74051/first-step-in-cross-platform-trojan-bankers-from-brazil-done/
+
First widespread virus cross-infection
+
http://www.symantec.com/connect/blogs/first-widespread-virus-cross-infection
+
Five charged in largest hacking scheme ever prosecuted in US
+
http://www.securityweek.com/five-charged-largest-hacking-scheme-ever-prosecuted-us
+
Flame, Duqu and Stuxnet: in-depth code analysis of mssecmgr.ocx
+
http://blog.eset.com/2012/07/20/flame-in-depth-code-analysis-of-mssecmgr-ocx blog.eset.com
+
Flame: replication via Windows Update MITM proxy
+
http://www.securelist.com/en/blog/208193566/Flame Replication via Windows Update MITM proxy server
+
Flamer analysis: framework reconstruction
+
http://blog.eset.com/2012/08/02/flamer-analysis-framework-reconstruction blog.eset.com
+
Flamer: highly sophisticated and discreet threat targets the Middle East
+
http://www.symantec.com/connect/blogs/flamer-highly-sophisticated-and-discreet-threat-targets-middle-east
+
Flamer: urgent suicide
+
http://www.symantec.com/connect/blogs/flamer-urgent-suicide
+
Flashfake Mac OS X botnet confirmed
+
http://www.securelist.com/en/blog/208193441/Flashfake Mac OS X botnet confirmed
+
Fortiguard: Android/Stiniter.A!tr
+
http://www.fortiguard.com/av/VID3677621 www.fortiguard.com
+
Fox-IT
+
https://www.fox-it.com/
+
From Georgia, with love Win32/Georbot
+
http://blog.eset.com/wp-content/media files/ESET win32georbot analysis final.pdf blog.est.com (pdf)
+
From Sakura to Reveton via Smoke Bot - or a botnet distribution of Reveton
+
http://malware.dontneedcoffee.com/2012/09/from-sakura-to-reveton-via-smoke-bot-or.html
+
Full analysis of Flame's Command & Control servers
+
http://www.securelist.com/en/blog/750/Full Analysis of Flame s Command Control servers
+
Full analysis of Flame's command & control servers
+
https://www.securelist.com/en/blog/750/Full Analysis of Flame s Command Control servers
+
G
Gamarue dropping Lethic bot
+
http://research.zscaler.com/2015/06/gamarue-dropping-lethic-bot.html
+
GandCrab ransomware distributed by RIG and GrandSoft exploit kits
+
https://blog.malwarebytes.com/threat-analysis/2018/01/gandcrab-ransomware-distributed-by-rig-and-grandsoft-exploit-kits/
+
Gangstaservice Winlock Affiliate
+
http://www.xylibox.com/2012/08/gangstaservice-winlock-affiliate.html
+
Gauss: Nation-state cyber-surveillance meets banking Trojan
+
http://www.securelist.com/en/blog/208193767/Gauss Nation state cyber surveillance meets banking Trojan
+
Gauss: abnormal distribution
+
http://www.securelist.com/en/analysis/204792238/Gauss Abnormal Distribution
+
Get gamed and rue the day...
+
http://blogs.technet.com/b/mmpc/archive/2011/10/25/get-gamed-and-rue-the-day.aspx
+
Getting more "personal" & deeper into Cridex with parfeit credential stealer infection
+
http://malwaremustdie.blogspot.jp/2012/12/get-more-personal-deeper-into-cridex.html malwaremustdie.blogspot.jp
+
Gimemo finally targeting USA with Camera Feature too
+
http://malware.dontneedcoffee.com/2012/07/gimemocameraUSA.html
+
Gimemo wants to play in the big league
+
http://malware.dontneedcoffee.com/2012/05/gimemo-wants-to-play-in-big-league.html
+
GingerMaster Android Malware Utilizing A Root Exploit
+
http://www.csc.ncsu.edu/faculty/jiang/GingerMaster/
+
Going solo: self-propagating ZBOT malware spotted
+
http://blog.trendmicro.com/trendlabs-security-intelligence/going-solo-self-propagating-zbot-malware-spotted/
+
Google Groups trojan
+
http://www.symantec.com/connect/blogs/google-groups-trojan
+
Got malware? Rent an exploit service
+
https://blog.damballa.com/archives/1893 blog.damballa.com
+
Gumblar Google-poisoning attack morphs
+
http://www.theregister.co.uk/2009/05/19/gumblar google poisoning update/
+
Guys behind Gauss and Flame are the same
+
http://blog.fireeye.com/research/2012/08/guys-behind-gauss-and-flame-are-the-same.html
+
H
HARMUR: storing and analyzing historic data on malicious domains
+
http://www.cs.bham.ac.uk/~covam/publications/badgers2011harmur.html www.cs.bham.ac.uk
+
HTran and the Advanced Persistent Threat
+
http://www.secureworks.com/cyber-threat-intelligence/threats/htran/
+
HackRead
+
https://www.hackread.com
+
Hackers are increasingly targeting IoT Devices with Mirai DDoS Malware
+
https://www.hackread.com/iot-devices-with-mirai-ddos-malware/
+
Hammertoss: stealthy tactics define a Russian cyber threat group
+
https://www2.fireeye.com/rs/848-DID-242/images/rpt-apt29-hammertoss.pdf
+
Harnig botnet: a retreating army
+
https://www.fireeye.com/blog/threat-research/2011/03/a-retreating-army.html
+
Harnig is back
+
https://www.fireeye.com/blog/threat-research/2011/08/harnig-is-back.html
+
Harvesting data on the Xarvester botmaster
+
http://krebsonsecurity.com/2012/08/harvesting-data-on-the-xarvester-botmaster/
+
Have we seen the end of the ZeroAccess botnet?
+
http://nakedsecurity.sophos.com/2014/01/07/have-we-seen-the-end-of-the-zeroaccess-botnet/
+
Hello Neutrino ! (just one more Exploit Kit)
+
http://malware.dontneedcoffee.com/2013/03/hello-neutrino-just-one-more-exploit-kit.html
+
Herpes botnet
+
http://xylibox.blogspot.fr/2011/12/herpes-botnet.html xylibox.blogspot.fr
+
HerpesNet botnet 1.7
+
http://toolzware.com/theblog/herpesnet-botnet-1-7/ toolzware.com
+
Hesperbot – A new, advanced banking trojan in the wild
+
http://www.eset.com/us/resources/white-papers/Hesperbot Whitepaper.pdf
+
Hiding in plain sight: the FAKEM remote access trojan
+
http://blog.trendmicro.com/trendlabs-security-intelligence/hiding-in-plain-sight-the-fakem-remote-access-trojan/
+
Hiloti: the (bot)master of disguise
+
http://blog.fortinet.com/hiloti-the-botmaster-of-disguise/ blog.fortinet.com
+
Hodprot: hot to bot
+
http://go.eset.com/us/resources/white-papers/Hodprot-Report.pdf go.eset.com (PDF)
+
How Lockergoga took down Hydro — ransomware used in targeted attacks aimed at big business
+
https://doublepulsar.com/how-lockergoga-took-down-hydro-ransomware-used-in-targeted-attacks-aimed-at-big-business-c666551f5880
+
How to steal a Botnet and what can happen when you do
+
http://www.youtube.com/watch?v=2GdqoQJa6r4 Youtube
+
Hébergeurs malhonnêtes : nouvelle fermeture (3FN)
+
http://blog.crimenumerique.fr/2009/06/06/hebergeurs-malhonnetes-nouvelle-fermeture-3fn/
+
I
IRC bot for Android
+
http://www.securelist.com/en/blog/208193332/IRC bot for Android
+
IcoScript: using webmail to control malware
+
https://www.virusbtn.com/virusbulletin/archive/2014/08/vb201408-IcoScript
+
Illuminating the Etumbot APT backdoor
+
http://www.arbornetworks.com/asert/2014/06/illuminating-the-etumbot-apt-backdoor/
+
Infamous Skynet botnet author allegedly arrested
+
http://www.malwaretech.com/2013/12/infamous-skynet-botnet-author-allegedly.html
+
Inside Andromeda Bot v2.06 Webpanel / AKA Gamarue - Botnet Control Panel
+
http://malware.dontneedcoffee.com/2012/07/inside-andromeda-bot-v206-webpanel-aka.html
+
Inside Blackhole Exploits Kit v1.2.4 - Exploit Kit Control Panel
+
http://malware.dontneedcoffee.com/2012/07/inside-blackhole-exploits-kit-v124.html
+
Navigation menu
Personal tools
Log in
Namespaces
Property
Discussion
Variants
Views
Read
View source
View history
More
Search
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Upload file
Special pages
Printable version
Permanent link
Page information
Browse properties