Property:Year
From Botnets.fr
Jump to navigation
Jump to search
This is a property of type
Page
.
Year
Usage
777
previous 250
20
50
100
250
500
next 250
Filter
<p>The <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Help:Property_page/Filter">search filter</a> allows the inclusion of <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Help:Query_expressions">query expressions</a> such as <code>~</code> or <code>!</code>. The selected <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Query_engine">query engine</a> might also support case insensitive matching or other short expressions like:</p><ul><li><code>in:</code> result should include the term, e.g. '<code>in:Foo</code>'</li></ul><ul><li><code>not:</code> result should to not include the term, e.g. '<code>not:Bar</code>'</li></ul>
Showing 250 pages using this property.
"
"Crypto Ransomware" CTB-Locker (Critroni.A) on the rise
+
2014
+
"NetTraveler is Running!" - Red Star APT attacks compromise high-profile victims
+
2013
+
"njRAT" Uncovered
+
2013
+
'
'Tigger' trojan keeps security researchers hopping
+
2009
+
1
1940 IPs for a BHEK/ULocker server - Nexcess-Net
+
2012
+
A
A DDoS family affair: Dirt Jumper bot family continues to evolve
+
2012
+
A Foray into Conficker’s Logic and Rendezvous Points
+
2009
+
A ScarePakage variant is targeting more countries : impersonating Europol and AFP
+
2014
+
A case study on Storm worm
+
2008
+
A chat with NGR Bot
+
2012
+
A new iteration of the TDSS/TDL-4 malware using DGA-based command and control
+
2012
+
A peek inside the Darkness (Optima) DDoS Bot
+
2012
+
A peek inside the PickPocket botnet
+
2012
+
A quick update on spambot Kelihos
+
2012
+
A study of the Ilomo / Clampi botnet
+
2009
+
A study on botnet detection techniques
+
2012
+
APT1: technical backstage
+
2013
+
AbaddonPOS: A new point of sale threat linked to Vawtrak
+
2015
+
Acquisition and analysis of volatile memory from Android devices
+
2012
+
Actually, my name is Duqu - Stuxnet is my middle name
+
2012
+
Adobe Flash Player 0-day and HackingTeam's Remote Control System
+
2013
+
Adrenalin botnet. The trend marks the Russian crimeware
+
2009
+
Advancing the fight against botnets with consumer notifications
+
2011
+
Aldi Bot - bka.de DDoS
+
2011
+
Alina: casting a shadow on POS
+
2013
+
Alina: following the shadow part 1
+
2013
+
Alina: following the shadow part 2
+
2013
+
All-in-one malware: an overview of Sality
+
2010
+
An Analysis of the iKeeB (duh) iPhone botnet (Worm)
+
2009
+
An advanced hybrid peer-to-peer botnet
+
2007
+
An analysis of Dorkbot’s infection vectors (part 2)
+
2012
+
An analysis of the cross-platform backdoor NetWeirdRC
+
2012
+
An analysis of underground forums
+
2011
+
An encounter with trojan Nap
+
2013
+
An evaluation of current and future botnet defences
+
2010
+
An interesting case of JRE sandbox breach (CVE-2012-0507)
+
2012
+
An internet census taken by an illegal botnet – A qualitative assessment of published measurements
+
2014
+
An overnight sensation — CoreBot returns as a full-fledged financial malware
+
2015
+
An overview of exploit packs
+
2012
+
An overview of messaging botnets
+
2013
+
Analyse de Xtreme RAT
+
2012
+
Analyse et poncage du botnet HerpesNet
+
2012
+
Analyse of the sample cdorked.A
+
2013
+
Analyse statique de Duqu stage 1
+
2012
+
Analyse statique de Duqu stage 2
+
2012
+
Analysis of DarkMegi aka NpcDark
+
2012
+
Analysis of TDL4
+
2012
+
Analysis of Ysreef (a variant of Tobfy)
+
2012
+
Analysis of a PlugX malware variant used for targeted attacks
+
2013
+
Analysis of a VBScript bot
+
2014
+
Analysis of a stage 3 Miniduke malware sample
+
2013
+
Analysis of a “/0” stealth scan from a botnet
+
2012
+
Analysis of functions used to encode strings in Flame (GDB script)
+
2012
+
Analysis of ngrBot
+
2011
+
Analysis of the Finfisher lawful interception malware
+
2012
+
Analysis of the malware of Red October - Part 1
+
2013
+
Analysis of the malware of Red October - Part 2
+
2013
+
Analysis: Malware Win32/Rimecud.B
+
2011
+
Analyzing a new exploit pack
+
2012
+
Anaru malware now live and ready to steal
+
2012
+
And real name of Magnitude is....
+
2014
+
Android Marcher now marching via porn sites
+
2016
+
Android RATs branch out with Dendroid
+
2014
+
Android malware pairs man-in-the-middle with remote-controlled banking trojan
+
2012
+
Android trojan used to create simple SMS spam botnet
+
2012
+
Android.Bmaster: A million-dollar mobile botnet
+
2012
+
Android.Counterclank found in official Android market
+
2012
+
Andromeda 2.7 features
+
2014
+
Angler Exploit Kit – Operating at the Cutting Edge
+
2015
+
Anonymous supporters tricked into installing ZeuS trojan
+
2012
+
Another family of DDoS bots: Avzhan
+
2010
+
Anunak:APT against financial institutions
+
2014
+
Análisis del comportamiento de VOlk y sus funcionalidades
+
2012
+
Apache binary backdoors on Cpanel-based servers
+
2013
+
Apple releases Java update; includes fix for vulnerability exploited by Flashback malware
+
2012
+
Apple took 3 years to fix Finfisher trojan hole
+
2011
+
Apple zombie malware 'NetWeird' rummages for browser and email passwords
+
2012
+
Armenian Bredolab creator jailed for computer sabotage
+
2012
+
Attack on Zygote: a new twist in the evolution of mobile threats
+
2016
+
Attackers place Command and Control servers inside enterprise walls
+
2012
+
Attention! All data on your hardrive is encrypted
+
2013
+
AutoIT ransomware
+
2012
+
Avalanche phishers migrate to ZeuS
+
2010
+
Avatar rootkit: the continuing saga
+
2013
+
B
Back to Stuxnet: the missing link
+
2012
+
Backdoor uses Evernote as command and control server
+
2013
+
Banking trojan Dridex uses macros for infection
+
2014
+
BareBox: efficient malware analysis on bare-metal
+
2011
+
Battling the Rustock threat
+
2011
+
Battling the Zbot threat
+
2010
+
Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration Panel
+
2012
+
Bitcrypt broken
+
2014
+
Black Dragon: "... and all will burn beneath the shadow of my wings"
+
2013
+
BlackEnergy competitor – The 'Darkness' DDoS bot
+
2010
+
Blackhole & Cridex: season 2 episode 1: Intuit spam & SSL traffic analysis
+
2012
+
Blackhole Ramnit - samples and analysis
+
2012
+
Blackhole and Cool Exploit kits nearly extinct
+
2013
+
Blackhole exploit kit v2 on the rise
+
2012
+
Blackhole, CVE-2012-0507 and Carberp
+
2012
+
Bleeding Life Exploit Pack
+
2010
+
Bot Roast II nets 8 individuals
+
2007
+
Bot herders build newer versions of previous botnet Waledac
+
2013
+
Bot of the day: Ramnit/Ninmul
+
2011
+
Bot shopping with my wife
+
2012
+
BotGrep: finding P2P bots with structured graph analysis
+
2012
+
BoteAR: a “social botnet”- What are we talking about
+
2012
+
Botnet command server hidden in Tor
+
2012
+
Botnet construction, control and concealment
+
2008
+
Botnet operation disabled
+
2011
+
Botnet shutdown success story - again: disabling the new Hlux/Kelihos botnet
+
2012
+
Botnet shutdown success story: how Kaspersky Lab disabled the Hlux/Kelihos botnet
+
2011
+
Botnet: classification, attacks, detection, tracing, and preventive measures
+
2009
+
Botnets on discount!
+
2011
+
Boxer SMS trojan: malware as a global service
+
2012
+
Bredolab botmaster ‘Birdie’ still at large
+
2012
+
Bredolab severely injured but not dead
+
2010
+
Buh-bye Beebone! Law enforcement kills polymorphic virus-spreading botnet
+
2015
+
C
CTB-Locker is back: the web server edition
+
2016
+
CVE-2012-4681 - On its way to Sakura Exploit Kit too
+
2012
+
CVE-2012-4681 - Redkit Exploit Kit - I want Porche Turbo
+
2012
+
CVE-2012-4681 - Связка Sweet Orange
+
2012
+
CVE-2012-5076 - Massively adopted - Blackhole update to 2.0.1
+
2012
+
CVE-2013-1493 (jre17u15 - jre16u41) integrating exploit kits
+
2013
+
CVE-2013-2465/CVE-2013-2471/CVE-2013-2463 integrating Exploit Kits -- jre7u21 CVE- jre6u45 and earlier
+
2013
+
CVE-2013-5330 (Flash) in an unknown Exploit Kit fed by high rank websites
+
2014
+
CVE-2015-0311 (Flash up to 16.0.0.287) integrating Exploit Kits
+
2015
+
Carbanak/Anunak in the BlueCoat malware analysis appliance
+
2015
+
Carbanak: Multi-million dollar cybercrime gang focuses on banks rather than their customers
+
2015
+
Carberp + BlackHole = growing fraud incidents
+
2011
+
Carberp - a modular information stealing trojan
+
2011
+
Carberp gang evolution: CARO 2012 presentation
+
2012
+
Carberp reverse engineering
+
2011
+
Carberp steals e-cash vouchers from Facebook users
+
2012
+
Carberp, the renaissance ?
+
2012
+
Carberp-based trojan attacking SAP
+
2013
+
Carberp-in-the-Mobile
+
2012
+
Carberp: Silent trojan, eventual successor to ZeuS
+
2011
+
Carberp: it’s not over yet
+
2012
+
Case study of the Miner botnet
+
2012
+
Cerber Dominates Ransomware Landscape After Locky's Demise
+
2017
+
Chameleon botnet grabbed $6m A MONTH from online ad-slingers
+
2013
+
Chapro.A source code
+
2011
+
Chasing cybercrime: network insights of Dyre and Dridex trojan bankers
+
2015
+
China targets macs used by NGOs
+
2012
+
Cimbot - A technical analysis
+
2009
+
Citadel : le fichier de configuration
+
2012
+
Citadel V1.3.5.1: enter the fort’s dungeons
+
2012
+
Citadel ZeuS bot
+
2012
+
Citadel plitfi botnet report
+
2013
+
Citadel trojan malware analysis
+
2012
+
Citadel trojan touts trouble-ticket system
+
2012
+
Citadel: a cyber-criminal’s ultimate weapon?
+
2012
+
Clampi/Ligats/Ilomo trojan
+
2009
+
Collateral damage: Microsoft hits security researchers along with Citadel
+
2013
+
Combatting point-of-sale malware
+
2014
+
Conficker working group: lessons learned
+
2010
+
Confidential documents from Japanese politics stolen by malware
+
2012
+
Cool EK : "Hello my friend..." CVE-2012-5076
+
2012
+
Cool Exploit Kit - A new Browser Exploit Pack on the Battlefield with a "Duqu" like font drop
+
2012
+
Cool exploit kit - URL structure
+
2012
+
Coordinated DDoS attack during Russian Duma elections
+
2011
+
Coreflood botnet - Detection and remediation
+
2011
+
Covert channels over social networks
+
2012
+
Cracking down on botnets
+
2010
+
Cracking into the new P2P variant of Zeusbot/Spyeye
+
2011
+
Cracking the encrypted C&C protocol of the ZeroAccess botnet
+
2012
+
Crisis for Windows sneaks onto virtual machines
+
2012
+
Critroni crypto ransomware seen using Tor for command and control
+
2014
+
Cross-platform Frutas RAT builder and back door
+
2013
+
CryptXXX: new ransomware from the actors behind Reveton, dropping via Angler
+
2016
+
Crypto breakthrough shows Flame was designed by world-class scientists
+
2012
+
Crypto experts called on to crack cyberspy tool's encryption
+
2012
+
CryptoDefense and How Decrypt ransomware information guide and FAQ
+
2014
+
Cutwail drives spike in malicious HTML attachment spam
+
2012
+
Cyber gang seeks botmasters to wage massive wave of trojan attacks against U.S. banks
+
2012
+
D
DDoS attacks: the Zemra bot
+
2012
+
DDoS watch: keeping an eye on Aldi Bot
+
2011
+
DISCLOSURE: detecting botnet command and control servers through large-scale NetFlow analysis
+
2012
+
DNS: a botnet dialect
+
2012
+
DaRK DDoSseR leads to Gh0st RAT
+
2012
+
DarkMegi rootkit - sample (distributed via Blackhole)
+
2012
+
Darkmegi: this is not the Rootkit you’re looking for
+
2012
+
Darkness DDoS bot version identification guide
+
2011
+
De code van Dorifel nader bekeken
+
2012
+
Demystifying Pobelka
+
2013
+
Department of Justice takes action to disable international botnet
+
2011
+
Department of Labor strategic web compromise
+
2013
+
Detecting extended attributes (ZeroAccess) and other Frankenstein’s monsters with HMFT
+
2013
+
Detection and classification of different botnet C&C channels
+
2009
+
Dharma Ransomware Uses AV Tool to Distract from Malicious Activities
+
2019
+
Digging inside Tinba malware - A walkthrough
+
2012
+
Digging into the Nitol DDoS botnet
+
2012
+
Dirt Jumper DDoS bot increasingly popular
+
2012
+
Discerning relationships: the Mexican botnet connection
+
2010
+
Discovered: botnet costing display advertisers over six million dollars per month
+
2013
+
Disorderly conduct: localized malware impersonates the police
+
2011
+
Disttrack malware overwrites files, infects MBR
+
2012
+
Disttrack sabotage malware wipes data at unnamed Middle East energy organization
+
2012
+
Doctor Web a détecté un botnet enrôlant plus de 550 000 Mac
+
2012
+
Doctor Web exposes 550 000 strong Mac botnet
+
2012
+
Domain generation algorithms (DGA) in stealthy malware
+
2012
+
Dorifel crypto malware paralyzes Dutch companies and public sector
+
2012
+
Dorifel is much bigger than expected and it’s still active and growing!
+
2012
+
Dorifel virus gereed voor Nederlandse banking phishing
+
2012
+
Dorifel/Quervar: the support scammer’s secret weapon
+
2012
+
Dorkbot: conquistando Latinoamérica
+
2012
+
Dragonfly Threat Against Western Energy Suppliers
+
2014
+
Dridex learns new trick: P2P over HTTP
+
2014
+
DroidLive New SMS Android Trojan
+
2011
+
Duqu FAQ
+
2011
+
Dutch users served Sinowal for lunch
+
2012
+
Dyre Banking Trojan
+
2014
+
E
ESET analyzes first Android file-encrypting, TOR-enabled ransomware
+
2014
+
EURO Winlocker
+
2012
+
Egypt Finfisher intrusion tools and ethics
+
2011
+
Emerging attack vectors - RSA slide deck
+
2012
+
Encyclopedia entry: Win32/Carberp
+
2011
+
Encyclopedia entry: Win32/Conficker
+
2011
+
Encyclopedia entry: Win32/Oderoor
+
2008
+
Equation: the Death Star of malware galaxy
+
2015
+
Esthost taken down - Biggest cybercriminal takedown in history
+
2011
+
Etude sur le fonctionnement du Trojan.Matsnu.1 codant les données des utilisateurs
+
2012
+
Evolution of Win32Carberp: going deeper
+
2011
+
Exploring the market for stolen passwords
+
2012
+
F
F-Secure has discovered MiniDuke malware samples in the wild
+
2014
+
FAQ on Kelihos.B/Hlux.B sinkholing
+
2012
+
FBI shuts down Coreflood botnet, zombies transmitting financial data
+
2011
+
Fake FBI Ransomware analysis
+
2012
+
Fast look at Sundown EK
+
2015
+
Fast look at an infection by a Blackhole Exploit Kit 2.0
+
2012
+
Feodo - a new botnet on the rise
+
2010
+
Festi botnet analysis & investigation
+
2012
+
FighterPOS: a new one-man PoS malware campaign
+
2015
+
File infector Expiro hits US, steals FTP credentials
+
2013
+
First step in cross-platform Trojan bankers from Brazil done
+
2016
+
First widespread virus cross-infection
+
2013
+
Five charged in largest hacking scheme ever prosecuted in US
+
2013
+
Flame, Duqu and Stuxnet: in-depth code analysis of mssecmgr.ocx
+
2012
+
Flame: replication via Windows Update MITM proxy
+
2012
+
Flamer analysis: framework reconstruction
+
2012
+
Flamer: highly sophisticated and discreet threat targets the Middle East
+
2012
+
Flamer: urgent suicide
+
2012
+
Flashfake Mac OS X botnet confirmed
+
2012
+
Fortiguard: Android/Stiniter.A!tr
+
2012
+
From Georgia, with love Win32/Georbot
+
2012
+
From Sakura to Reveton via Smoke Bot - or a botnet distribution of Reveton
+
2012
+
Full analysis of Flame's Command & Control servers
+
2012
+
Full analysis of Flame's command & control servers
+
2012
+
G
Gamarue dropping Lethic bot
+
2015
+
GandCrab ransomware distributed by RIG and GrandSoft exploit kits
+
2018
+
Navigation menu
Personal tools
Log in
Namespaces
Property
Discussion
Variants
Views
Read
View source
View history
More
Search
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Upload file
Special pages
Printable version
Permanent link
Page information
Browse properties