Semantic search

Jump to navigation Jump to search
 AuthorEditorBotnet
1940 IPs for a BHEK/ULocker server - Nexcess-NetKafeineULocker
A DDoS family affair: Dirt Jumper bot family continues to evolveCurt WilsonArbor SERTDirt Jumper
Pandora
Russkill
Dirt Jumper September
Simple
Di BoTNet
A chat with NGR BotChong Rong HwaInfoSec InstitudeDorkbot
A new iteration of the TDSS/TDL-4 malware using DGA-based command and controlDamballaTDL-4
DGAv14
TDSS
A peek inside the Darkness (Optima) DDoS BotDancho DanchevWebrootDarkness
A peek inside the PickPocket botnetDancho DanchevWebrootPickPocket
A quick update on spambot KelihosAbuse.chKelihos
Storm
Waledac
A study on botnet detection techniquesHaritha.S. Nair
Vinodh Ewards S E
International Journal of Scientific and Research Publications
Acquisition and analysis of volatile memory from Android devicesJoe Sylve
Andrew Case
Lodovico Marziale
Golden G. Richard
Elsevier
Actually, my name is Duqu - Stuxnet is my middle nameSergei ShevchenkoBAE Systems stratsecDuqu
Stuxnet
An analysis of Dorkbot’s infection vectors (part 2)Horea CoroiuMicrosoft Malware Protection CentreDorkbot
An analysis of the cross-platform backdoor NetWeirdRCLysa MyersIntegoNetWeird
An interesting case of JRE sandbox breach (CVE-2012-0507)Jeong Wook (Matt) Oh
Chun Feng
Microsoft
An overview of exploit packsMila ParkourContagio
Analyse de Xtreme RATRootBSDMalware.luXtreme RAT
Analyse et poncage du botnet HerpesNetRootBSDMalware.luHerpesNet
Analyse statique de Duqu stage 1Paul RascagnèresMalware.luDuqu
Analyse statique de Duqu stage 2RootBSDMalware.luDuqu
Analysis of DarkMegi aka NpcDarkKimberlyStopMalvertisingDarkMegi
Analysis of TDL4Sergei ShevchenkoBAE SystemsTDL-4
Analysis of Ysreef (a variant of Tobfy)Hugo CaronMalware.luYsreef
Analysis of a “/0” stealth scan from a botnetAlberto Dainotti
Alistair King
Kimberly Claffy
Ferdinando Papale
Antonio Pescapé
Sality
Analysis of functions used to encode strings in Flame (GDB script)RootBSDMalware.luFlame
Analysis of the Finfisher lawful interception malwareClaudio GuarnieriRapid7Finfisher
Analyzing a new exploit packDarrylKahu Security
Anaru malware now live and ready to stealJoji HamadaSymantecMaistealer
Android malware pairs man-in-the-middle with remote-controlled banking trojanCarlos CastilloMcAfee LabsFakeToken
Android trojan used to create simple SMS spam botnetAndrew ConwayCloudmarkSpamSoldier
Android.Bmaster: A million-dollar mobile botnetCathal MullaneySymantecBmaster
Android.Counterclank found in official Android marketIrfan AsrarSymantec
Anonymous supporters tricked into installing ZeuS trojanSymantecZeuS
Análisis del comportamiento de VOlk y sus funcionalidadesFernando CatoiraESETVOlk
Apple releases Java update; includes fix for vulnerability exploited by Flashback malwareIntegoFlashback
Apple zombie malware 'NetWeird' rummages for browser and email passwordsPaul DucklinSophos LabsNetWeird
Armenian Bredolab creator jailed for computer sabotageChristopher BrookKaspersky labBredolab
Attackers place Command and Control servers inside enterprise wallsBrian PrinceSecurity WeekWaledac
AutoIT ransomwareHugo CaronMalware.luRansom.II
Back to Stuxnet: the missing linkAleksKaspersky labFlame
Stuxnet
Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration PanelKafeine
Blackhole & Cridex: season 2 episode 1: Intuit spam & SSL traffic analysisAndré M. DiMinoCridex
Blackhole Ramnit - samples and analysisMila Parkour
Blackhole exploit kit v2 on the risePradeep KulkarniZscaler
Blackhole, CVE-2012-0507 and CarberpDavid Harley
Aleksandr Matrosov
ESETCarberp
Bot shopping with my wifeLuis CorronsPanda LabsAinslot
BotGrep: finding P2P bots with structured graph analysisShishir Nagaraja
Prateek Mittal
Chi-yao Hong
Matthew Caesar
Nikita Borisov
BoteAR: a “social botnet”- What are we talking aboutJorge MieresKaspersky labBoteAR
Botnet command server hidden in TorTSGDataSkynet
Botnet shutdown success story - again: disabling the new Hlux/Kelihos botnetStefan OrtloffKaspersky labKelihos
Boxer SMS trojan: malware as a global servicePablo RamosESETBoxer
Bredolab botmaster ‘Birdie’ still at largeBrian KrebsKrebs on SecurityBredolab
CVE-2012-4681 - On its way to Sakura Exploit Kit tooKafeine
CVE-2012-4681 - Redkit Exploit Kit - I want Porche TurboKafeine
CVE-2012-4681 - Связка Sweet OrangeKafeine
CVE-2012-5076 - Massively adopted - Blackhole update to 2.0.1Kafeine
Carberp gang evolution: CARO 2012 presentationAleksandr MatrosovESETCarberp
Carberp steals e-cash vouchers from Facebook usersAmit KleinTrusteerCarberp
Carberp, the renaissance ?KafeineCarberp
Carberp-in-the-MobileDenis MaslennikovKaspersky labCarberp
Carberp: it’s not over yetVyacheslav ZakorzhevskyKaspersky labCarberp
Case study of the Miner botnetDaniel Plohmann
Elmar Gerhards-Padilla
4th International Conference on Cyber Con ict
China targets macs used by NGOsF-SecureGhostnet
Citadel : le fichier de configurationFabien PerigaudLEXSICitadel
Citadel V1.3.5.1: enter the fort’s dungeonsLimor KessemRSACitadel
Citadel ZeuS botSherb1nCyber Sleuth
Citadel trojan malware analysisJason MilletaryDELL SecureWorksCitadel
Citadel trojan touts trouble-ticket systemBrian KrebsBrian KrebsCitadel
Citadel: a cyber-criminal’s ultimate weapon?Jérôme SeguraMalwarebytesCitadel
Confidential documents from Japanese politics stolen by malwarePierluigi PaganiniSecurity Affairs
Cool EK : "Hello my friend..." CVE-2012-5076Kafeine
Cool Exploit Kit - A new Browser Exploit Pack on the Battlefield with a "Duqu" like font dropKafeine
Cool exploit kit - URL structureFort Knox Networks
Covert channels over social networksJose SelviSANS Institute
Cracking the encrypted C&C protocol of the ZeroAccess botnetJohn MorrisVirus BulletinZeroAccess
Crisis for Windows sneaks onto virtual machinesTakashi KatsukiSymantecCrisis
Crypto breakthrough shows Flame was designed by world-class scientistsDan GoodinFlame
Crypto experts called on to crack cyberspy tool's encryptionKelly Jackson HigginsUBMGauss
Cutwail drives spike in malicious HTML attachment spamRodel MendrezM86 Security LabsCutwail
Cyber gang seeks botmasters to wage massive wave of trojan attacks against U.S. banksMor AhuviaRSAPrinimalka
DDoS attacks: the Zemra botAlan NevilleSymantecZemra
DISCLOSURE: detecting botnet command and control servers through large-scale NetFlow analysisChristopher Kruegel
Leyla Bilge
Davide Balzarotti
William Robertson
Engin Kirda
ACSAC
DNS: a botnet dialectFrancisco J. Gómez Rodríguez
Carlos Díaz Hidalgo
IniquaMorto
Feederbot
DaRK DDoSseR leads to Gh0st RATNart VilleneuveTrend MicroDaRK DDoSseR
Gh0st RAT
DarkMegi rootkit - sample (distributed via Blackhole)Mila ParkourContagioDarkMegi
Darkmegi: this is not the Rootkit you’re looking forCraig SchmugarMcAfee
De code van Dorifel nader bekekenBrenno de WinterIDGDorifel
Digging inside Tinba malware - A walkthroughAditya K SoodSecNicheTinba
Digging into the Nitol DDoS botnetItai LibaMcAfeeNitol
Dirt Jumper DDoS bot increasingly popularJose NazarioArbor SertDirt Jumper
Disttrack malware overwrites files, infects MBRCris PantanillaTrend MicroDistTrack
Disttrack sabotage malware wipes data at unnamed Middle East energy organizationFahmida Y. RashidWired Business MediaDistTrack
Doctor Web a détecté un botnet enrôlant plus de 550 000 MacDoctor WebFlashback
Doctor Web exposes 550 000 strong Mac botnetDoctor WebFlashback
Domain generation algorithms (DGA) in stealthy malwareGunter OllmannDamballaConficker
Dorifel crypto malware paralyzes Dutch companies and public sectorEmsisoftCitadel
Dorifel
Dorifel is much bigger than expected and it’s still active and growing!David JacobyKaspersky labDorifel
Dorifel virus gereed voor Nederlandse banking phishingHuub RoemDigital InvestigationDorifel
Dorifel/Quervar: the support scammer’s secret weaponDavid HarleyESETDorifel
Dorkbot: conquistando LatinoaméricaPablo RamosESETDorkbot
Dutch users served Sinowal for lunchRoland Dela PazTrendMicroSinowal
EURO WinlockerXylitolXylitolLockScreen.CI