Property:Year
From Botnets.fr
Jump to navigation
Jump to search
This is a property of type
Page
.
Year
Usage
777
previous 500
20
50
100
250
500
next 500
Filter
<p>The <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Help:Property_page/Filter">search filter</a> allows the inclusion of <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Help:Query_expressions">query expressions</a> such as <code>~</code> or <code>!</code>. The selected <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Query_engine">query engine</a> might also support case insensitive matching or other short expressions like:</p><ul><li><code>in:</code> result should include the term, e.g. '<code>in:Foo</code>'</li></ul><ul><li><code>not:</code> result should to not include the term, e.g. '<code>not:Bar</code>'</li></ul>
Showing 500 pages using this property.
G
Gangstaservice Winlock Affiliate
+
2012
+
Gauss: Nation-state cyber-surveillance meets banking Trojan
+
2012
+
Gauss: abnormal distribution
+
2012
+
Get gamed and rue the day...
+
2012
+
Getting more "personal" & deeper into Cridex with parfeit credential stealer infection
+
2012
+
Gimemo finally targeting USA with Camera Feature too
+
2012
+
Gimemo wants to play in the big league
+
2012
+
GingerMaster Android Malware Utilizing A Root Exploit
+
2011
+
Going solo: self-propagating ZBOT malware spotted
+
2013
+
Google Groups trojan
+
2009
+
Got malware? Rent an exploit service
+
2013
+
Gumblar Google-poisoning attack morphs
+
2009
+
Guys behind Gauss and Flame are the same
+
2012
+
H
HARMUR: storing and analyzing historic data on malicious domains
+
2011
+
HTran and the Advanced Persistent Threat
+
2011
+
Hackers are increasingly targeting IoT Devices with Mirai DDoS Malware
+
2016
+
Hammertoss: stealthy tactics define a Russian cyber threat group
+
2015
+
Harnig botnet: a retreating army
+
2011
+
Harnig is back
+
2011
+
Harvesting data on the Xarvester botmaster
+
2012
+
Have we seen the end of the ZeroAccess botnet?
+
2014
+
Hello Neutrino ! (just one more Exploit Kit)
+
2013
+
Herpes botnet
+
2011
+
HerpesNet botnet 1.7
+
2012
+
Hesperbot – A new, advanced banking trojan in the wild
+
2013
+
Hiding in plain sight: the FAKEM remote access trojan
+
2013
+
Hodprot: hot to bot
+
2011
+
How Lockergoga took down Hydro — ransomware used in targeted attacks aimed at big business
+
2019
+
How to steal a Botnet and what can happen when you do
+
2009
+
Hébergeurs malhonnêtes : nouvelle fermeture (3FN)
+
2009
+
I
IRC bot for Android
+
2012
+
IcoScript: using webmail to control malware
+
2014
+
Illuminating the Etumbot APT backdoor
+
2014
+
Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat
+
2012
+
Infamous Skynet botnet author allegedly arrested
+
2013
+
Inside Andromeda Bot v2.06 Webpanel / AKA Gamarue - Botnet Control Panel
+
2012
+
Inside Blackhole Exploits Kit v1.2.4 - Exploit Kit Control Panel
+
2012
+
Inside Carberp botnet
+
2011
+
Inside Citadel 1.3.4.5 C&C & Builder - Botnet Control Panel
+
2012
+
Inside Impact exploit kit
+
2012
+
Inside Pony 1.7 / Fareit C&C - Botnet Control Panel
+
2012
+
Inside Smoke Bot - Botnet Control Panel
+
2012
+
Inside Smoke Bot - botnet control panel
+
2012
+
Inside Ulocker
+
2012
+
Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control Panel
+
2012
+
Inside an APT campaign with multiple targets in India and Japan
+
2012
+
Inside the Grum botnet
+
2012
+
Inside the world of the Citadel trojan
+
2013
+
Inside view of Lyposit aka (for its friends) Lucky LOCKER
+
2012
+
Insights from the analysis of the Mariposa botnet
+
2010
+
Insights into Win32/Bradop
+
2012
+
Interconnection of Gauss with Stuxnet, Duqu & Flame
+
2012
+
International cyber ring that infected millions of computers dismantled
+
2011
+
Internet Census 2012, port scanning /0 using insecure embedded devices
+
2013
+
Introducing Ponmocup-Finder
+
2012
+
It’s 2012 and Armageddon has arrived
+
2012
+
It’s not the end of the world: DarkComet misses by a mile
+
2012
+
J
Java Runtime Environment 1.7 Zero-Day Exploit Delivers Backdoor
+
2012
+
Java Zero-Days and the Blackhole Exploit Kit
+
2012
+
Joint strike force against Dorifel
+
2012
+
K
Kaptoxa point-of-sale compromise
+
2014
+
Karagny.L unpack
+
2012
+
Kaspersky Lab et Seculert annoncent la récente découverte de « Madi », une nouvelle attaque de cyberespionnage au Moyen‑Orient
+
2012
+
Kaspersky security bulletin 2015. Overall statistics for 2015
+
2015
+
Kelihos back in town using Fast Flux
+
2012
+
Kelihos botnet appears again with new variant
+
2013
+
Kelihos botnet trying to expand by harnessing Russian national sentiments
+
2014
+
Kelihos is dead. Long live Kelihos
+
2012
+
Kelihos is dead… No wait… Long live Kelihos! Again!
+
2013
+
Kelihos/Hlux botnet returns with new techniques
+
2012
+
Kelihos: not alien resurrection, more attack of the clones
+
2012
+
King of spam:Festi botnet analysis
+
2012
+
Know your enemy: tracking botnets
+
2008
+
Koobface botnet master KrotReal back in business, distributes ransomware and promotes BHSEO service/product
+
2012
+
Koobface, un écosystème cybercriminel ou le conte des Mille et une nuits ?
+
2010
+
Kore exploit kit
+
2013
+
Kraken botnet infiltration
+
2008
+
L
Large-scale analysis of malware downloaders
+
2012
+
Latest Kelihos botnet shut down live at RSA Conference 2013
+
2013
+
Latest SpyEye botnet active and cheaper
+
2012
+
Latin American banks under fire from the Mexican VOlk-botnet
+
2011
+
Le dropper de CTB-Locker
+
2015
+
Learning stateful models for network honeypots
+
2012
+
Legal implications of countering botnets
+
2012
+
Leouncia - Yet another backdoor
+
2010
+
Leouncia - Yet another backdoor - Part 2
+
2010
+
Library file in certain Android apps connects to C&C servers
+
2012
+
Lifting the lid on the Redkit exploit kit (Part 1)
+
2013
+
Lights Out: Dragonfly is on the move
+
2014
+
Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole
+
2013
+
Locky Ransomware switches to the Lukitus extension for Encrypted Files
+
2017
+
LogPOS - new point of sale malware using mailslots
+
2015
+
Long life to Kelihos!
+
2012
+
Look what I found: it's a Pony!
+
2013
+
M
MDK: the largest mobile botnet in China
+
2013
+
MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled
+
2016
+
MP-DDoser: A rapidly improving DDoS threat
+
2012
+
MP-DDoser:Monitoring a rapidly improving DDoS threat
+
2012
+
MSIE 0-day exploit CVE-2014-0322 - Possibly targeting French aerospace association
+
2014
+
MSRT April 2012: Win32/Claretore
+
2012
+
MSRT April 2014 – Ramdo
+
2014
+
MSRT June '12 - cleanup on aisle one
+
2012
+
MSRT March 2012: breaking bad
+
2012
+
MSRT November '12 - Weelsof around the world
+
2012
+
MSRT September '12 - Medfos, hijacking your daily search
+
2012
+
MSRT march: three hioles in one
+
2012
+
Maazben: best of both worlds
+
2009
+
Mac BackDoor.Wirenet.1 config extractor
+
2012
+
Mac Flashback exploiting unpatched Java vulnerability
+
2012
+
Mac spyware found at Oslo Freedom Forum
+
2013
+
Madi is back - New Tricks and a new Command&Control server
+
2012
+
Mahdi malware finds 150 new targets including U.S. and Germany, gets more evasive
+
2012
+
Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-mode
+
2012
+
Malicious Apache module injects Iframes
+
2012
+
Malicious Apache module used for content injection: Linux/Chapro.A
+
2012
+
Malware 2 - from infection to persistence
+
2012
+
Malware Memory Analysis - Volatility
+
2012
+
Malware Uses Google Go Language
+
2012
+
Malware analysis Rannoh/Matsnu
+
2012
+
Malware analysis of the Lurk downloader
+
2014
+
Malware analysis tutorial 32: exploration of botnet client
+
2012
+
Malware attacking POS systems
+
2012
+
Malware discovered developed with Google's "Go" programming language
+
2012
+
Malware evolving to defeat anti-DDoS services like CloudFlare?
+
2013
+
Malware for everyone - Aldi Bot at a discount price
+
2011
+
Malware hunting with the Sysinternals tools
+
2012
+
Malware pandemics
+
2010
+
Malware targeting Windows 8 uses Google Docs
+
2012
+
Mariposa botnet 'mastermind' jailed in Slovenia
+
2013
+
Massive Drop in number of active Zeus C&C servers
+
2010
+
Massive search fraud botnet seized by Microsoft and Symantec
+
2013
+
Mastermind behind Gozi bank malware charged along with two others
+
2013
+
McAfee Labs threat advisory : W32.Pinkslipbot
+
2012
+
Measuring and detecting Fast-Flux service networks
+
2008
+
Measuring and detecting malware downloads in live network traffic
+
2013
+
Measuring botnet populations
+
2012
+
Meet "Red Dot exploit toolkit"
+
2013
+
Meet CritXPack (Previously Vintage Pack)
+
2012
+
Meet ProPack Exploit Pack - yes that's a lot of pack
+
2012
+
Meet ‘Flame’, the massive spy malware infiltrating Iranian computers
+
2012
+
Members of the largest criminal group engaged in online banking fraud are detained
+
2012
+
Mexican Twitter-controlled botnet unpicked
+
2010
+
Microsoft and Symantec take down Bamital botnet that hijacks online searches
+
2013
+
Microsoft and financial services industry leaders target cybercriminal operations from ZeuS botnets
+
2012
+
Microsoft disrupts the emerging Nitol botnet being spread through an unsecure supply chain
+
2012
+
Microsoft neutralizes Kelihos botnet, names defendant in case
+
2011
+
Microsoft partners with Interpol, industry to disrupt global malware attack affecting more than 770,000 PCs in past six months
+
2015
+
Microsoft security updates January 2016
+
2016
+
Miniduke
+
2013
+
MoVP 1.3 Desktops, heaps, and ransomware
+
2012
+
Mocbot spam analysis
+
2006
+
Monkif botnet hides commands in JPEGs
+
2012
+
More Flame/Skywiper CNC behavior uncovered
+
2012
+
More details of the Dorifel servers
+
2012
+
Morto worm sets a (DNS) record
+
2011
+
Mpack installs ultra-invisible trojan
+
2007
+
Multitenancy Botnets thwart threat analysis
+
2012
+
Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication
+
2013
+
N
NASK shuts down dangerous Virut botnet domains
+
2013
+
NGRBot spreads via chat
+
2012
+
Necurs Quick Analysis
+
2012
+
Neosploit gets Java 0-Day
+
2012
+
Nepalese government websites compromised to serve Zegost RAT
+
2012
+
NetTraveler APT gets a makeover for 10th birthday
+
2014
+
NetTraveler is back: the 'Red Star' APT returns with new tricks
+
2013
+
New Apple Mac trojan called OSX/Crisis discovered
+
2012
+
New Chinese exploit pack
+
2012
+
New CryptoLocker spreads via removable drives
+
2013
+
New Duqu sample found in the wild
+
2012
+
New GamaPoS malware piggybacks on Andromeda botnet; spreads in 13 US states
+
2015
+
New IE Zero-Day used in targeted attacks
+
2010
+
New IceIX (ZeuS variant) changes its encryption method (again)
+
2011
+
New Mac malware discovered on attendee computer at anti-surveillance workshop
+
2013
+
New Mahdi updates, new C2 server
+
2012
+
New PoS malware “Backoff” targets US
+
2014
+
New RATs emerge from leaked Njw0rm source code
+
2015
+
New Thor botnet nearly ready to be sold, price $8,000
+
2012
+
New Xtreme RAT attacks US, Israel, and other foreign governments
+
2012
+
New crimeware attacks LatAm bank users
+
2013
+
New crypto-ransomware JIGSAW plays nasty games
+
2016
+
New crypto-ransomware emerge in the wild
+
2014
+
New point-of-sale malware distributed by Andromeda botnet
+
2015
+
New ransomware plays its victims an audio file, over and over and over…
+
2012
+
New trojan found: Admin.HLP leaks organizations data
+
2012
+
New virus SMSZombie.A discovered by TrustGo Security Labs
+
2012
+
NewPosThings has new PoS things
+
2015
+
Newly detected Crisis virus infects Windows, Macs and virtual machines
+
2012
+
Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilities
+
2013
+
Ngrbot steals information and mine Bitcoins
+
2011
+
NitlovePOS: another new POS malware
+
2015
+
Nitol DDoS botnet discovered in China
+
2012
+
NjRAT & H-Worm variant infections continue to rise
+
2015
+
Not just a one-trick PonyDOS
+
2012
+
Now you Z-(eus) it, now you don’t: ZeuS bots silently upgraded to Citadel
+
2012
+
Nuevo botnet contra Mexico: Karn!v0r3x
+
2012
+
Nymaim - obfuscation chronicles
+
2013
+
O
OSX Kitmos analysis
+
2013
+
OSX.Iservice technical details
+
2009
+
OSX.iService its not going to iWork for you
+
2009
+
OSX/Crisis has been used as part of a targeted attack
+
2012
+
OSX/Flashback - The first malware to infect hundreds of thousands of Apple Mac
+
2012
+
Obama order sped up wave of cyberattacks against Iran
+
2012
+
Olmasco bootkit: next circle of TDL4 evolution (or not)
+
2012
+
On botnets that use DNS for command and control
+
2011
+
On the analysis of the ZeuS botnet crimeware toolkit
+
2010
+
One Sinowal trojan + one gang = hundreds of thousands of compromised accountS
+
2008
+
One bot to rule them all
+
2012
+
One-man PoS malware operation captures 22,000 credit card details in Brazil
+
2015
+
Operation Bot Roast II
+
2007
+
Operation SnowMan: DeputyDog actor compromises US veterans of foreign wars website
+
2014
+
Operation Socialist The Inside Story Of How British Spies Hacked Belgium’s Largest Telco
+
2014
+
OphionLocker: Joining in the Ransomware Race
+
2014
+
Over 9 million PCs infected - ZeroAccess botnet uncovered
+
2012
+
Overcoming reputation and proof-of-work systems in botnets
+
2010
+
Overview: inside the ZeuS trojan’s source code
+
2011
+
Owning Kraken zombies
+
2008
+
P
P2P botnet Kelihos.B with 100.000 nodes sinkholed
+
2012
+
PETYA crypto-ransomware overwrites MBR to lock users out of their computers
+
2016
+
Panda Security uncovers bot-killing malware
+
2012
+
Panel Gendarmerie
+
2012
+
Panel Supern0va et virus gendarmerie
+
2012
+
Panel Virus Gendarmerie : Ratio 0.36%
+
2012
+
Part virus, part botnet, spreading fast: Ramnit moves past Facebook passwords
+
2012
+
Peer-to-peer botnets: overview and case study
+
2007
+
PeerRush: mining for unwanted P2P traffic
+
2013
+
Petya ransomware skips the files and encrypts your hard drive instead
+
2016
+
Pitou, The “silent” resurrection of the PITOU notorious Srizbi kernel spambot
+
2014
+
Playing cops & robbers with banks & browsers
+
2012
+
PlugX malware: A good hacker is an apologetic hacker
+
2016
+
PlugX: new tool for a not so new campaign
+
2012
+
PlugX: some uncovered points
+
2014
+
PoS RAM scraper malware; past, present and future
+
2014
+
Poison Ivy 2.3.0 Documentation
+
2007
+
Poison Ivy: assessing damage and extracting intelligence
+
2014
+
PoisonIvy adapts to communicate through authentication proxies
+
2015
+
Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware
+
2010
+
PokerAgent botnet stealing over 16,000 Facebook credentials
+
2013
+
Police Trojan crosses the Atlantic, now targets USA and Canada
+
2012
+
Ponmocup analysis
+
2012
+
Post-mortem of a zombie: Conficker cleanup after six years
+
2015
+
Pramro and Sality - two PEs in a pod
+
2012
+
Proactive detection of network security incidents
+
2011
+
Proactive detection of security incidents II - Honeypots
+
2012
+
Proactive policy measures by Internet service providers against Botnets
+
2012
+
Probing the Gozi-Prinimalka campaign
+
2012
+
Pushdo botnet gets DGA update, over 6,000 machines host new variant
+
2014
+
Q
Qadars: un nouveau malware bancaire avec un composant mobile
+
2013
+
Quervar – Induc.C reincarnate
+
2012
+
QuickPost: Flame & Volatility
+
2012
+
R
REVETON Ransomware Spreads with Old Tactics, New Infection Method
+
2014
+
REvil ransomware gang's web sites mysteriously shut down
+
2021
+
RIG exploit kit strikes oil
+
2014
+
Ramnit goes social
+
2012
+
Ransom.II - UGC payment for USA - Windows Genuine impersonation for DE
+
2012
+
Ransomware : Smile you're on camera - Reveton.C new landing pages
+
2012
+
Ransomware : la sulfureuse hypothèse sur la situation chez Norsk Hydro
+
2019
+
Ransomware Casier - Sharing Design with Lyposit - Gaelic & Persian (
+
2012
+
Ransomware Fake Microsoft Security Essentials
+
2012
+
Ransomware and Silence Locker control panel
+
2012
+
Ransomware crimeware kits
+
2012
+
Ransomware gets professional, targeting Switzerland, Germany and Austria
+
2012
+
Ransomware or Wiper? LockerGoga Straddles the Line
+
2019
+
Ransomware report: the rise of BandarChor
+
2015
+
Ransomware « Trojan.Casier » Panel
+
2012
+
Ransomware ‘Holds Up’ victims
+
2012
+
Ransomware: playing on your fears
+
2012
+
Redkit - one account = one color
+
2012
+
Redkit : No more money ! Traffic US, CA, GB, AU
+
2012
+
Relentless Zbot and anti-emulations
+
2012
+
Research Win32/Slenfbot
+
2011
+
Researchers: Bredolab still lurking, though severely injured
+
2010
+
Reversing Andromeda-Gamarue botnet
+
2013
+
Reversing malware loaders - The Matsnu-A Case
+
2012
+
Reversing the wrath of Khan
+
2012
+
Reveton += HU, LV, SK, SI, TR (!), RO - So spreading accross Europe with 6 new Design
+
2012
+
Reveton Autumn Collection += AU,CZ, IE, NO & 17 new design
+
2012
+
Reveton can speak now !
+
2012
+
Reveton.A
+
2012
+
Richard Clarke on who was behind the Stuxnet attack
+
2012
+
Rmnet.12 created a million Windows computer botnet
+
2012
+
RootSmart Android malware
+
2012
+
RootSmart malware utilizes GingerBreak root exploit
+
2012
+
Rovnix Reloaded: new step of evolution
+
2012
+
Rovnix bootkit framework updated
+
2012
+
Rovnix.D: the code injection story
+
2012
+
Russian service online to check the detection of malware
+
2009
+
Réflexions pour un plan d'action contre les botnets
+
2010
+
S
SDBot IRC botnet continues to make waves
+
2009
+
SGNET: a worldwide deployable framework to support the analysis of malware threat models
+
2008
+
SIM-ple: mobile handsets are weak link in latest online banking fraud scheme
+
2012
+
SIRv12
+
2012
+
SIRv12: the obstinacy of Conficker
+
2012
+
SKyWIper: A complex malware for targeted attacks
+
2012
+
SPL exploit kit – now with CVE-2013-0422
+
2013
+
SamSam Ransomware Evolves Its Tactics Towards Targeting Whole Companies
+
2018
+
SamSam ransomware designed to inundate targeted networks with thousands of copies of itself
+
2018
+
Saudi Aramco hit by computer virus
+
2012
+
Say hello to Tinba: world’s smallest trojan-banker
+
2012
+
Scareware locks down computer due to child porn and terrorism
+
2012
+
Secrets of the Comfoo masters
+
2013
+
Security Response Android.Counterclank
+
2012
+
Security alert: SpamSoldier
+
2012
+
Security alert: new Android malware - TigerBot - identified in alternative markets
+
2012
+
Security alert: new TGLoader Android malware utilizes the exploid root exploit
+
2012
+
Security alert: new variants of Legacy Native (LeNa) identified
+
2012
+
Security experts detected new Twitter-controlled botnet
+
2010
+
Shamoon the Wiper in details
+
2012
+
Shamoon the Wiper: further details (Part II)
+
2012
+
Shamoon the wiper - copycats at work
+
2012
+
Shedding light on the NeoSploit Exploit Kit
+
2011
+
Shylock financial malware back 'with a vengeance'
+
2012
+
Sinowal analysis (Windows 7, 32-bit)
+
2012
+
Sinowal: MBR rootkit never dies! (and it always brings some new clever features)
+
2012
+
Sinowal: the evolution of MBR rootkit continues
+
2011
+
Skunkx DDoS bot analysis
+
2011
+
Skynet, a Tor-powered botnet straight from Reddit
+
2012
+
Smartcard vulnerabilities in modern banking malware
+
2012
+
Social networks – A bonanza for cybercriminals
+
2016
+
Sony PlayStation's site SQL injected, redirecting to rogue security software
+
2008
+
Sony/Destover: mystery North Korean actor’s destructive and past network activity
+
2014
+
Sopelka Botnet: three banking trojans and one banking panel
+
2012
+
Source Code for IoT Botnet ‘Mirai’ Released
+
2016
+
Spam botnets: The fall of Grum and the rise of Festi
+
2012
+
Spambot evolution 2011
+
2011
+
Spread of Darkness...Details on the public release of the Darkness DDoS bot
+
2011
+
SpyEye being kicked to the curb by its customers?
+
2012
+
Stamp EK (aka SofosFO) now showing "Blackhole 2.0 Like" landing pages
+
2012
+
Static analysis of Dalvik bytecode and reflection in Android
+
2012
+
Stealing money from ATMs with malware
+
2013
+
Stealthy peer-to-peer C&C over SMB pipes
+
2013
+
Stealthy router-based botnet worm squirming
+
2009
+
Step-by-step reverse engineering malware: ZeroAccess / Max++ / Smiscer crimeware rootkit
+
2010
+
Stolen passwords allowed hackers to steal over one billion rubles
+
2015
+
Study of malware obfuscation techniques
+
2012
+
Survey on network-based botnet detection methods
+
2013
+
Symantec/Android.Ackposts
+
2012
+
Symantec/Android.Maistealer
+
2012
+
Symantec/Backdoor.Arcomrat
+
2012
+
Symantec/W32.Zorenium
+
2014
+
T
TDI - a new element in old TDSS story
+
2012
+
TDL3 : The rootkit of all evil
+
2010
+
TDL4 - Top Bot
+
2011
+
TDL4 reloaded: Purple Haze all in my brain
+
2012
+
TDSS botnet: full disclosure
+
2012
+
TR-24 analysis - Destory RAT family
+
2014
+
Takeover of Virut domains
+
2013
+
Taking down botnets: Microsoft and the Rustock botnet
+
2011
+
Tales from Crisis, Chapter 1: The dropper’s box of tricks
+
2012
+
Tales from Crisis, Chapter 2: Backdoor’s first steps
+
2012
+
Tales from Crisis, Chapter 3: The Italian rootkit job
+
2012
+
Tales from Crisis, Chapter 4: a ghost in the network
+
2012
+
Targeted attacks and Ukraine
+
2014
+
Targeted destructive malware explained: Troj/Mdrop-ELD
+
2012
+
Targeted information stealing attacks in South Asia use email, signed binaries
+
2013
+
Tatanga attack exposes chipTAN weaknesses
+
2012
+
Tatanga: a new banking trojan with MitB functions
+
2011
+
Tequila botnet leads to phishing attack
+
2010
+
The "Red October" campaign - An advanced cyber espionage network targeting diplomatic and government agencies
+
2013
+
The 'Penquin' Turla
+
2014
+
The ACCDFISA malware family – Ransomware targeting Windows servers
+
2012
+
The ACCDFISA malware family – Ransomware targetting Windows servers
+
2012
+
The Andromeda/Gamarue botnet is on the rise again
+
2015
+
The Coreflood report
+
2008
+
The Cridex trojan targets 137 financial organizations in one go
+
2012
+
The DGA of Symmi
+
2015
+
The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements
+
2014
+
The Dorkbot rises
+
2012
+
The Elderwood project (infographic)
+
2012
+
The Epic Turla operation
+
2014
+
The Flame: questions and answers
+
2012
+
The IMDDOS botnet: discovery and analysis
+
2010
+
The Madi campaign - Part II
+
2012
+
The Miner botnet: Bitcoin mining goes peer-to-peer
+
2011
+
The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoor
+
2013
+
The Mirage campaign
+
2012
+
The Pobelka botnet - a command and control case study
+
2012
+
The Sality botnet
+
2010
+
The Target breach by the numbers
+
2014
+
The Waledac protocol: the how and why
+
2009
+
The ZeroAccess botnet revealed
+
2013
+
The ZeroAccess botnet: mining and fraud for massive financial gain
+
2012
+
The ZeroAccess rootkit
+
2012
+
The anatomy of a botnet
+
2010
+
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet
+
2010
+
The case of TDL3
+
2010
+
The evolution of TDL: conquering x64
+
2011
+
The evolution of webinjects
+
2014
+
The first trojan in history to steal Linux and Mac OS X passwords
+
2012
+
The good , the bad and the unknown online scanners
+
2011
+
The graphic design of "Maktub Locker" ransomware
+
2016
+
The growing threat to business banking online
+
2009
+
The life cycle of web server botnet recruitment
+
2013
+
The lifecycle of peer-to-peer (Gameover) ZeuS
+
2012
+
The most sophisticated Android trojan
+
2013
+
The mystery of Duqu framework solved
+
2012
+
The mystery of Duqu: part five
+
2011
+
The mystery of Duqu: part one
+
2011
+
The mystery of Duqu: part six (the command and control servers)
+
2011
+
The mystery of Duqu: part ten
+
2012
+
The mystery of Duqu: part three
+
2011
+
The mystery of Duqu: part two
+
2011
+
The mystery of the Duqu framework
+
2012
+
The new era of botnets
+
2010
+
The resurrection of RedKit
+
2014
+
The rise of TOR-based botnets
+
2013
+
The tigger trojan: icky, sticky stuff
+
2009
+
The underground economy of spam: a botmaster's perspective of coordinating large-scale spam campaigns
+
2011
+
The where and why of Hlux
+
2012
+
The world's biggest botnets
+
2007
+
The ‘Madi’ infostealers - a detailed analysis
+
2012
+
The ‘advertising’ botnet
+
2011
+
The “Hikit” rootkit: advanced and persistent attack techniques (part 1)
+
2012
+
The “Hikit” rootkit: advanced and persistent attack techniques (part 2)
+
2012
+
Threat spotlight: Angler lurking in the domain shadows
+
2015
+
Three month FrameworkPOS malware campaign nabs ~43,000 credit cards from point of sale systems
+
2016
+
Tilon-son of Silon
+
2012
+
Tilon/SpyEye2 intelligence report
+
2014
+
TinyNuke may be a ticking time bomb
+
2017
+
Tis the season for shipping and phishing
+
2015
+
Top 50 bad hosts & networks 2011 Q4
+
2012
+
Top spam botnets exposed
+
2008
+
Torpig - Back to the future or how the most sophisticated trojan in 2008 reinvents itself
+
2011
+
TorrentLocker ransomware uses email authentication to refine spam runs
+
2015
+
Tracking down the author of the PlugX RAT
+
2012
+
Traffic direction systems as malware distribution tools
+
2011
+
Travnet botnet steals huge amount of sensitive data
+
2013
+
Travnet trojan could be part of APT campaign
+
2013
+
TreasureHunt: a custom POS malware tool
+
2016
+
Trend Micro discovers MalumPoS; malware targeting hotels and other US industries
+
2015
+
Trojan ChePro, the CPL storm
+
2013
+
Trojan Nap aka Kelihos/Hlux - Feb. 2013 status update
+
2013
+
Trojan downloaders on the rise: don’t let Locky or TeslaCrypt ruin your day
+
2016
+
Trojan horse using sender policy framework
+
2013
+
Trojan moves its configuration to Twitter, LinkedIn, MSDN and Baidu
+
2012
+
Trojan on the loose: an in-depth analysis of police trojan
+
2012
+
Trojan.Prinimalka: bits and pieces
+
2012
+
Trojan.Ransomgerpo criminal arrested
+
2013
+
Trojan.Taidoor takes aim at policy think tanks
+
2012
+
Trojan.Tatanarg.B careful!
+
2012
+
Trojan.Whitewell: what’s your (bot) Facebook status today?
+
2009
+
Trojan.ZeroAccess infection analysis
+
2012
+
Trusteer warns of new two headed trojan attack against online banks
+
2009
+
Twitter + Pastebin = malware update
+
2009
+
U
Un WOMBAT pour évaluer la cybercriminalité
+
2009
+
Under the hood of Carberp: Malware & configuration analysis
+
2010
+
Under the hood of the cyber attack on U.S. banks
+
2013
+
Unexpected reboot: Necurs
+
2012
+
Unveiling an Indian cyberattack infrastructure - a special report
+
2013
+
Unveiling the network criminal infrastructure of TDSS/TDL4 - DGAv14: a case study on a new TDSS/TDL4 variant
+
2012
+
Upas Kit (aka Rombrast) integrates webinjects
+
2012
+
Upatre, Dyre used in Univ. of Florida attack
+
2015
+
Update to Citadel : 1.3.5.1 Rain Edition.
+
2012
+
Update to Citadel : v.1.3.4.5
+
2012
+
Updated Sundown Exploit Kit Uses Steganography
+
2016
+
Urausy has big plan for Europe - Targeting 3 new countries among which Norway !
+
2012
+
Urausy improving its localization - A (the\?) Gaelic Ransomware with Interpol impersonation as default landing
+
2012
+
Urausy ransomware - July 2013 design refresh - "Summer 2013 collection"
+
2013
+
Urausy: Colorfull design refresh (+HR) & EC3 Logo
+
2013
+
Using libemu to create malware flow graph
+
2010
+
V
VOlk-botnet takes over Latin America
+
2011
+
Vawtrak gains momentum and expands targets
+
2014
+
Versatile and infectious: Win64/Expiro is a cross-platform file infector
+
2013
+
VinSelf - A new backdoor in town
+
2010
+
ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar
+
2017
+
Virus Gendarmerie : variante Office Centrale de Luttre contre la criminalité – controle informationnel
+
2012
+
Virus scanners for virus authors
+
2009
+
Virus scanners for virus authors, part II
+
2010
+
Virut malware fuels Waledac botnet resurgence
+
2013
+
W
W32.Changeup: how the worm was created
+
2012
+
W32.Duqu, the precursor to the next Stuxnet
+
2011
+
W32.Flamer: spreading mechanism tricks and exploits
+
2012
+
W32.Qakbot in detail
+
2001
+
W32.Shadesrat (Blackshades) author arrested
+
2012
+
W32.Stuxnet dossier
+
2011
+
W32.Tinba (Tinybanker) The turkish incident
+
2012
+
W32.Xpaj.B: making easy money from complex code
+
2011
+
Waledac Botnet - Deployment and Communication Analysis
+
2009
+
Waledac gets cozy with Virut
+
2013
+
Walking through Win32/Jabberbot.A instant messaging C&C
+
2013
+
Watch out for CoreBot, new stealer in the wild
+
2015
+
Weelsof use SSL C&C
+
2012
+
What was that Wiper thing?
+
2012
+
What’s the buzz with Bafruz
+
2012
+
Where Are They Today? Cybercrime Trojans That No One Misses: Shifu Malware
+
2017
+
Who's behind the Koobface botnet? - An OSINT analysis
+
2012
+
Who's behind the world's largest spam botnet?
+
2012
+
Why forums? An empirical analysis into the facilitating factors of carding forums
+
2013
+
Win32/64:Napolar: New trojan shines on the cyber crime-scene
+
2013
+
Win32/Gataka - or should we say Zutick?
+
2012
+
Win32/Gataka banking Trojan - Detailed analysis
+
2012
+
Win32/Gataka: a banking Trojan ready to take off
+
2012
+
Win32/Sality newest component: a router’s primary DNS changer named Win32/RBrute
+
2014
+
Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems
+
2012
+
Win32/Virlock: First Self-Reproducing Ransomware is also a Shape Shifter
+
2014
+
Win32/Vundo
+
2013
+
Winlock affiliate
+
2012
+
Wire Transfer Spam Spreads Upatre
+
2014
+
Worm:VBS/Jenxcus
+
2014
+
X
XPAJ: reversing a Windows x64 bootkit
+
2012
+
Xarvester, the new Srizbi?
+
2009
+
Navigation menu
Personal tools
Log in
Namespaces
Property
Discussion
Variants
Views
Read
View source
View history
More
Search
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Upload file
Special pages
Printable version
Permanent link
Page information
Browse properties