Property:Link
From Botnets.fr
Jump to navigation
Jump to search
This is a property of type
URL
.
Usage
807
previous 100
20
50
100
250
500
next 100
Filter
<p>The <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Help:Property_page/Filter">search filter</a> allows the inclusion of <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Help:Query_expressions">query expressions</a> such as <code>~</code> or <code>!</code>. The selected <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Query_engine">query engine</a> might also support case insensitive matching or other short expressions like:</p><ul><li><code>in:</code> result should include the term, e.g. '<code>in:Foo</code>'</li></ul><ul><li><code>not:</code> result should to not include the term, e.g. '<code>not:Bar</code>'</li></ul>
Showing 100 pages using this property.
P
PlugX: new tool for a not so new campaign
+
http://blog.trendmicro.com/plugx-new-tool-for-a-not-so-new-campaign/
+
PlugX: some uncovered points
+
http://blog.cassidiancybersecurity.com/2014/01/plugx-some-uncovered-points.html
+
PoS RAM scraper malware; past, present and future
+
http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-pos-ram-scraper-malware.pdf
+
Poison Ivy 2.3.0 Documentation
+
http://www.poisonivy-rat.com/dl.php?file=230docs
+
Poison Ivy: assessing damage and extracting intelligence
+
https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-poison-ivy.pdf
+
PoisonIvy adapts to communicate through authentication proxies
+
http://blog.jpcert.or.jp/2015/07/poisonivy-adapts-to-communicate-through-authentication-proxies.html
+
Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware
+
https://www.sophos.com/medialibrary/PDFs/technical papers/sophosseoinsights.pdf
+
PokerAgent botnet stealing over 16,000 Facebook credentials
+
http://blog.eset.com/2013/01/29/pokeragent-stealing-over-16000-facebook-credentials blog.eset.com
+
Police Trojan crosses the Atlantic, now targets USA and Canada
+
http://blog.trendmicro.com/police-trojan-crosses-the-atlantic-now-targets-usa-and-canada/
+
Ponmocup analysis
+
http://security-research.dyndns.org/pub/botnet/ponmocup/ponmocup-analysis 2012-02-18.html
+
Post-mortem of a zombie: Conficker cleanup after six years
+
https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-asghari.pdf
+
Pramro and Sality - two PEs in a pod
+
http://blogs.technet.com/b/mmpc/archive/2012/02/21/pramro-and-sality-two-pes-in-a-pod.aspx
+
Proactive detection of network security incidents
+
http://www.enisa.europa.eu/activities/cert/support/proactive-detection/proactive-detection-report/at download/fullReport www.enisa.europa.eu (pdf)
+
Proactive detection of security incidents II - Honeypots
+
http://www.enisa.europa.eu/activities/cert/support/proactive-detection-of-security-incidents-II-honeypots www.enisa.europa.eu
+
Proactive policy measures by Internet service providers against Botnets
+
http://dx.doi.org/10.1787/5k98tq42t18w-en dx.doi.org
+
Probing the Gozi-Prinimalka campaign
+
http://blog.trendmicro.com/trendlabs-security-intelligence/probing-the-gozi-prinimalka-malware/
+
Proofpoint
+
http://www.proofpoint.com
+
Pushdo botnet gets DGA update, over 6,000 machines host new variant
+
http://www.scmagazine.com/pushdo-botnet-gets-dga-update-over-6000-machines-host-new-variant/article/361253/
+
Q
Qadars: un nouveau malware bancaire avec un composant mobile
+
http://www.lexsi-leblog.fr/cert/qadars-nouveau-malware-bancaire-composant-mobile.html
+
Quervar – Induc.C reincarnate
+
http://blog.eset.com/2012/08/21/quervar-induc-c-reincarnate blog.eset.com
+
QuickPost: Flame & Volatility
+
http://mnin.blogspot.fr/2012/06/quickpost-flame-volatility.html mnin.blogspot.com
+
R
REVETON Ransomware Spreads with Old Tactics, New Infection Method
+
http://blog.trendmicro.com/trendlabs-security-intelligence/reveton-ransomware-spreads-with-old-tactics-new-infection-method/
+
REvil ransomware gang's web sites mysteriously shut down
+
https://www.bleepingcomputer.com/news/security/revil-ransomware-gangs-web-sites-mysteriously-shut-down/
+
RIG exploit kit strikes oil
+
https://blogs.cisco.com/security/rig-exploit-kit-strikes-oil. blogs.cisco.com
+
Ramnit goes social
+
http://blog.seculert.com/2012/01/ramnit-goes-social.html
+
Ransom.II - UGC payment for USA - Windows Genuine impersonation for DE
+
http://malware.dontneedcoffee.com/2012/08/ransomii-ugc-payment-for-usa-windows.html
+
Ransomware : Smile you're on camera - Reveton.C new landing pages
+
http://malware.dontneedcoffee.com/2012/06/ransomware-smile-youre-on-camera.html
+
Ransomware : la sulfureuse hypothèse sur la situation chez Norsk Hydro
+
https://www.zdnet.fr/actualites/ransomware-la-sulfureuse-hypothese-sur-la-situation-chez-norsk-hydro-39882453.htm
+
Ransomware Casier - Sharing Design with Lyposit - Gaelic & Persian (
+
http://malware.dontneedcoffee.com/2012/09/ransom-casier-sharing-design-with.html
+
Ransomware Fake Microsoft Security Essentials
+
http://www.malekal.com/2012/08/20/ransomware-fake-microsoft-security-essentials/
+
Ransomware and Silence Locker control panel
+
http://www.symantec.com/connect/blogs/ransomware-and-silence-locker-control-panel
+
Ransomware crimeware kits
+
http://www.symantec.com/connect/blogs/ransomware-crimeware-kits
+
Ransomware gets professional, targeting Switzerland, Germany and Austria
+
http://www.abuse.ch/?p=3718
+
Ransomware or Wiper? LockerGoga Straddles the Line
+
https://blog.talosintelligence.com/2019/03/lockergoga.html
+
Ransomware report: the rise of BandarChor
+
https://www.f-secure.com/weblog/archives/00002795.html
+
Ransomware « Trojan.Casier » Panel
+
http://www.malekal.com/2012/09/18/ransomware-trojan-casier-panel/ www.malekal.com
+
Ransomware ‘Holds Up’ victims
+
http://blogs.mcafee.com/mcafee-labs/ransomware-holds-up-victims
+
Ransomware: playing on your fears
+
http://blogs.technet.com/b/mmpc/archive/2012/03/16/ransomware-playing-on-your-fears.aspx blog.technet.com
+
Redkit - one account = one color
+
http://malware.dontneedcoffee.com/2012/06/redkit-one-account-one-color.html
+
Redkit : No more money ! Traffic US, CA, GB, AU
+
http://malware.dontneedcoffee.com/2012/09/redkitnomoremoney.html
+
Relentless Zbot and anti-emulations
+
http://www.symantec.com/connect/blogs/relentless-zbot-and-anti-emulations
+
Research Win32/Slenfbot
+
http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?name=Win32/Slenfbot
+
Researchers: Bredolab still lurking, though severely injured
+
http://www.thetechherald.com/articles/Researchers-Bredolab-still-lurking-though-severely-injured-(Update-3)/11757/
+
Reversing Andromeda-Gamarue botnet
+
http://www.garage4hackers.com/content/154-reversing-andromeda-gamarue-botnet.html
+
Reversing malware loaders - The Matsnu-A Case
+
http://anti-reversing.com/Downloads/Sec Research/Reversing Malware Loaders - The Matsnu-A Case.pdf anti-reversing.com (PDF)
+
Reversing the wrath of Khan
+
http://ddos.arbornetworks.com/uploads/2012/03/Wrath-of-Khan1.pdf
+
Reveton += HU, LV, SK, SI, TR (!), RO - So spreading accross Europe with 6 new Design
+
http://malware.dontneedcoffee.com/2012/10/reveton-hu-lv-sk-sl-tr-ro-so-spreading.html
+
Reveton Autumn Collection += AU,CZ, IE, NO & 17 new design
+
http://malware.dontneedcoffee.com/2012/10/reveton-autumn-collection-aucz-ie-no-14.html
+
Reveton can speak now !
+
http://malware.dontneedcoffee.com/2012/11/reveton-speaking.html
+
Reveton.A
+
http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Trojan:Win32/Reveton.A#summary link
+
Richard Clarke on who was behind the Stuxnet attack
+
http://www.smithsonianmag.com/history-archaeology/Richard-Clarke-on-Who-Was-Behind-the-Stuxnet-Attack.html www.smithsonianmag.com
+
Rmnet.12 created a million Windows computer botnet
+
http://news.drweb.com/show/?i=2374&lng=en&c=9 news.drweb.com
+
RootSmart Android malware
+
http://resources.infosecinstitute.com/rootsmart-android-malware/
+
RootSmart malware utilizes GingerBreak root exploit
+
http://www.csc.ncsu.edu/faculty/jiang/RootSmart/
+
Rovnix Reloaded: new step of evolution
+
http://blog.eset.com/2012/02/22/rovnix-reloaded-new-step-of-evolution blog.eset.com
+
Rovnix bootkit framework updated
+
http://blog.eset.com/2012/07/13/rovnix-bootkit-framework-updated
+
Rovnix.D: the code injection story
+
http://blog.eset.com/2012/07/27/rovnix-d-the-code-injection-story blog.eset.com
+
Russian service online to check the detection of malware
+
http://malwareint.blogspot.fr/2009/11/russian-service-online-to-check.html
+
Réflexions pour un plan d'action contre les botnets
+
http://www.sstic.org/2010/presentation/Reflexions pour un plan d action contre les botnets/
+
S
SANS Institute
+
http://www.sans.org
+
SC Magazine
+
https://www.scmagazine.com
+
SDBot IRC botnet continues to make waves
+
http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp sdbot irc botnet continues to make waves pub.pdf
+
SGNET: a worldwide deployable framework to support the analysis of malware threat models
+
http://www.eurecom.fr/fr/publication/2445 www.eurecom.fr
+
SIM-ple: mobile handsets are weak link in latest online banking fraud scheme
+
http://www.trusteer.com/blog/sim-ple-mobile-handsets-are-weak-link-latest-online-banking-fraud-scheme
+
SIRv12
+
http://go.microsoft.com/?linkid=9807245 (PDF)
+
SIRv12: the obstinacy of Conficker
+
http://blogs.technet.com/b/mmpc/archive/2012/04/25/the-tenacity-of-conficker.aspx
+
SKyWIper: A complex malware for targeted attacks
+
http://www.crysys.hu/skywiper/skywiper.pdf www.crysys.hu
+
SPL exploit kit – now with CVE-2013-0422
+
http://ondailybasis.com/blog/2013/01/14/spl-exploit-kit-now-with-cve-2013-0422/
+
SamSam Ransomware Evolves Its Tactics Towards Targeting Whole Companies
+
https://threatpost.com/samsam-ransomware-evolves-its-tactics-towards-targeting-whole-companies/131519/
+
SamSam ransomware designed to inundate targeted networks with thousands of copies of itself
+
https://www.scmagazine.com/samsam-ransomware-designed-to-inundate-targeted-networks-with-thousands-of-copies-of-itself/article/762178/
+
Saudi Aramco hit by computer virus
+
http://www.guardian.co.uk/technology/2012/aug/16/saudi-aramco-computer-virus-hacking-claims www.guardian.co.uk
+
Say hello to Tinba: world’s smallest trojan-banker
+
http://www.csis.dk/en/csis/news/3566/
+
Scareware locks down computer due to child porn and terrorism
+
http://www.abuse.ch/?p=3610 abuse.ch
+
Secrets of the Comfoo masters
+
http://www.secureworks.com/cyber-threat-intelligence/threats/secrets-of-the-comfoo-masters/
+
Security Intelligence
+
https://securityintelligence.com/
+
Security Response Android.Counterclank
+
http://www.symantec.com/security response/writeup.jsp?docid=2012-012709-4046-99
+
Security alert: SpamSoldier
+
https://blog.lookout.com/blog/2012/12/17/security-alert-spamsoldier/ blog.lookout.com
+
Security alert: new Android malware - TigerBot - identified in alternative markets
+
http://research.nq.com/?p=402 research.nq.com
+
Security alert: new TGLoader Android malware utilizes the exploid root exploit
+
http://www.csc.ncsu.edu/faculty/jiang/TGLoader/
+
Security alert: new variants of Legacy Native (LeNa) identified
+
http://blog.mylookout.com/blog/2012/04/03/security-alert-new-variants-of-legacy-native-lena-identified/ blog.mylookout.com
+
Security experts detected new Twitter-controlled botnet
+
http://www.spamfighter.com/News-15132-Security-Experts-Detected-New-Twitter-Controlled-Botnet.htm
+
Shamoon the Wiper in details
+
https://www.securelist.com/en/blog/208193795/Shamoon the Wiper in details
+
Shamoon the Wiper: further details (Part II)
+
http://www.securelist.com/en/blog/208193834/Shamoon The Wiper further details Part II
+
Shamoon the wiper - copycats at work
+
https://www.securelist.com/en/blog?weblogid=208193786
+
Shedding light on the NeoSploit Exploit Kit
+
http://labs.m86security.com/2011/01/shedding-light-on-the-neosploit-exploit-kit/
+
Shylock financial malware back 'with a vengeance'
+
http://www.csoonline.com/article/700368/shylock-financial-malware-back-with-a-vengeance-
+
Sinowal analysis (Windows 7, 32-bit)
+
http://www.evild3ad.com/?p=1556 www.evild3ad.com
+
Sinowal: MBR rootkit never dies! (and it always brings some new clever features)
+
http://www.itsec.it/2012/06/06/sinowal-mbr-rootkit-never-dies-and-it-always-brings-some-new-clever-features/
+
Sinowal: the evolution of MBR rootkit continues
+
http://www.aall86.altervista.org/files/Sinowal new Analysis.pdf www.aall86.altervista.org
+
Skunkx DDoS bot analysis
+
https://asert.arbornetworks.com/skunkx-ddos-bot-analysis/
+
Skynet, a Tor-powered botnet straight from Reddit
+
https://community.rapid7.com/community/infosec/blog/2012/12/06/skynet-a-tor-powered-botnet-straight-from-reddit
+
Smartcard vulnerabilities in modern banking malware
+
http://blog.eset.com/2012/06/05/smartcard-vulnerabilities-in-modern-banking-malware
+
Social networks – A bonanza for cybercriminals
+
https://securelist.com/blog/incidents/73204/social-networks-a-bonanza-for-cybercriminals/
+
Sony PlayStation's site SQL injected, redirecting to rogue security software
+
http://www.zdnet.com/blog/security/sony-playstations-site-sql-injected-redirecting-to-rogue-security-software/1394 www.zdnet.com
+
Sony/Destover: mystery North Korean actor’s destructive and past network activity
+
https://securelist.com/blog/research/67985/destover/
+
Sopelka Botnet: three banking trojans and one banking panel
+
http://securityblog.s21sec.com/2012/10/sopelka-botnet-three-banking-trojans.html
+
Source Code for IoT Botnet ‘Mirai’ Released
+
http://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released/
+
Spam botnets: The fall of Grum and the rise of Festi
+
http://www.spamhaus.org/news/article/685/
+
Spambot evolution 2011
+
http://www.secureworks.com/cyber-threat-intelligence/threats/spambot-evolution/
+
Spread of Darkness...Details on the public release of the Darkness DDoS bot
+
http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20110123
+
Navigation menu
Personal tools
Log in
Namespaces
Property
Discussion
Variants
Views
Read
View source
View history
More
Search
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Upload file
Special pages
Printable version
Permanent link
Page information
Browse properties