Semantic search

Jump to navigation Jump to search
 AuthorEditorBotnet
Emerging attack vectors - RSA slide deckEd Skoudis
Etude sur le fonctionnement du Trojan.Matsnu.1 codant les données des utilisateursDr.WebRannoh
Exploring the market for stolen passwordsBrian KrebsBrian KrebsAndromeda
Citadel
FAQ on Kelihos.B/Hlux.B sinkholingDavid DittrichThe Honeynet ProjectKelihos
Fake FBI Ransomware analysisHynek BlinkaAVGReveton
Fast look at an infection by a Blackhole Exploit Kit 2.0Kafeine
Festi botnet analysis & investigationAleksandr Matrosov
Eugene Rodionov
ESETFesti
Flame, Duqu and Stuxnet: in-depth code analysis of mssecmgr.ocxAleksandr Matrosov
Eugene Rodionov
ESETDuqu
Flame
Stuxnet
Flame: replication via Windows Update MITM proxyAleksKaspersky labFlame
Flamer analysis: framework reconstructionAleksandr Matrosov
Eugene Rodionov
ESETFlame
Flamer: highly sophisticated and discreet threat targets the Middle EastSymantecFlame
Flamer: urgent suicideSymantecFlame
Flashfake Mac OS X botnet confirmedIgor SoumenkovKaspersky labFlashback
Fortiguard: Android/Stiniter.A!trFortinet
From Georgia, with love Win32/GeorbotESET
From Sakura to Reveton via Smoke Bot - or a botnet distribution of RevetonKafeineSmoke Bot
Reveton
Full analysis of Flame's Command & Control serversGReATKaspersky labFlame
Full analysis of Flame's command & control serversGReATKaspersky labFlame
Gangstaservice Winlock AffiliateXylitolXyliboxCasier
Gauss: Nation-state cyber-surveillance meets banking TrojanGReATKaspersky labFlame
Gauss
Stuxnet
Gauss: abnormal distributionGReATKaspersky labGauss
Get gamed and rue the day...Methusela Cebrian FerrerMicrosoftAndromeda
Getting more "personal" & deeper into Cridex with parfeit credential stealer infectionHendrik AdrianCridex
Gimemo finally targeting USA with Camera Feature tooKafeineGimemo
Gimemo wants to play in the big leagueKafeineGimemo
Guys behind Gauss and Flame are the sameAli IslamFireEyeFlame
Gauss
Harvesting data on the Xarvester botmasterBrian KrebsBrian KrebsSrizbi
Xarvester
HerpesNet botnet 1.7Lycroft EugeniaToolzwareHerpesNet
IRC bot for AndroidDenis MaslennikovKaspersky lab
Industrial espionage and targeted attacks: understanding the characteristics of an escalating threatOlivier Thonnard
Gavin O’Gorman
Leyla Bilge
Seán Kiernan
Martin Lee
RAID 2012Nitro
Sykipot
Taidoor
Stuxnet
Hydraq
Inside Andromeda Bot v2.06 Webpanel / AKA Gamarue - Botnet Control PanelKafeineAndromeda
Inside Blackhole Exploits Kit v1.2.4 - Exploit Kit Control PanelKafeine
Inside Citadel 1.3.4.5 C&C & Builder - Botnet Control PanelKafeineCitadel
Inside Impact exploit kitKafeineKafeine
Inside Pony 1.7 / Fareit C&C - Botnet Control PanelKafeineMalware don't need cofeePony
Inside Smoke Bot - Botnet Control PanelKafeineSmoke Bot
Inside Smoke Bot - botnet control panelKafeineSmoke Bot
Inside UlockerXylitolULocker
Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control PanelKafeineBlogspotUpas
Inside an APT campaign with multiple targets in India and JapanTrend Micro
Inside the Grum botnetBrian KrebsBrian KrebsGrum
Inside view of Lyposit aka (for its friends) Lucky LOCKERKafeineLyposit
Insights into Win32/BradopMicrosoftBradop
Interconnection of Gauss with Stuxnet, Duqu & FlameEugene RodionovESETDuqu
Flame
Gauss
Stuxnet
Introducing Ponmocup-FinderTom UPonmocup
It’s 2012 and Armageddon has arrivedJeff EdwardsArbor SERT
It’s not the end of the world: DarkComet misses by a mileJeff EdwardsArbor NetworksDarkComet
Java Runtime Environment 1.7 Zero-Day Exploit Delivers BackdoorManuel GatbuntonTrend Labs
Java Zero-Days and the Blackhole Exploit KitJon OliverTrend Micro
Joint strike force against DorifelSurfRightDorifel
Karagny.L unpackRootBSDMalware.luCasier
Kaspersky Lab et Seculert annoncent la récente découverte de « Madi », une nouvelle attaque de cyberespionnage au Moyen‑OrientKaspersky LabGlobal Security MagMadi
Kelihos back in town using Fast FluxAbuse.chKelihos
Waledac
Kelihos is dead. Long live KelihosGunter OllmannDamballaKelihos
Kelihos/Hlux botnet returns with new techniquesMaria GarnaevaKaspersky labKelihos
Kelihos: not alien resurrection, more attack of the clonesDavid HarleyESETKelihos
Storm
Waledac
King of spam:Festi botnet analysisAleksandr Matrosov
Eugene Rodionov
ESETFesti
Koobface botnet master KrotReal back in business, distributes ransomware and promotes BHSEO service/productDancho DanchevDancho DanchevKoobface
Large-scale analysis of malware downloadersChristian Rossow
Christian Dietrich
Herbert Bosz
DIMVAAndromeda
Donbot
Gameover
Sality
Virut
Renos
Winwebsec
Gbot
Dofoil
Karagany
Emit
GoldInstall
Rodecap
Harnig
Dabvegi
Zwangi
Dldr-#2
Dldr-#1
Dldr-#3
TDSS
Beebone
Latest SpyEye botnet active and cheaperUmesh WanveMcAfeeSpyEye
Learning stateful models for network honeypotsKonrad Rieck
Tammo Krueger
Hugo Gascon
Nicole Krämer
ACM
Legal implications of countering botnetsLiis Vihul
Christian Czosseck
Katharina Ziolkowski
Lauri Aasmann
Ivo A. Ivanov
Sebastian Brüggemann
NATO Cooperative Cyber Defence Centre of Excellence
Library file in certain Android apps connects to C&C serversWeichao SunTrend Micro
Long life to Kelihos!Gianluca GiulianiWebsenseKelihos
MP-DDoser: A rapidly improving DDoS threatJeff EdwardsArbor SertMP-DDoser
MP-DDoser:Monitoring a rapidly improving DDoS threatJeff EdwardsArbor SertMP-DDoser
MSRT April 2012: Win32/ClaretoreTim LiuMicrosoft
MSRT June '12 - cleanup on aisle oneMicrosoftKuluoz
MSRT March 2012: breaking badRex PlantadoMicrosoftDorkbot
MSRT November '12 - Weelsof around the worldPatrick EstavilloMicrosoftWeelsof
MSRT September '12 - Medfos, hijacking your daily searchShawn WangMicrosoftMedfos
MSRT march: three hioles in oneShawn WangMicrosoftAndromeda
Mac BackDoor.Wirenet.1 config extractorRootBSD
Malware.lu
Malware.luWirenet
Mac Flashback exploiting unpatched Java vulnerabilityBrodF-SecureFlashback
Madi is back - New Tricks and a new Command&Control serverNicolas BrulezKaspersky labMadi
Mahdi malware finds 150 new targets including U.S. and Germany, gets more evasiveMike LennonWired Business MediaMadi
Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-modeJames WykeSophos LabsZeroAccess
Malicious Apache module injects IframesDenis SinegubkoUnmask Parasites
Malicious Apache module used for content injection: Linux/Chapro.APierre-Marc BureauESET
Malware 2 - from infection to persistenceMark NichollsContextCarberp
Malware Memory Analysis - VolatilityBasement TechBasement PC Tech
Malware Uses Google Go LanguageFlora LiuSymantecEncriyoko
Malware analysis Rannoh/MatsnuPaul Rascagnères
Hugo Caron
Malware.luRannoh
Malware analysis tutorial 32: exploration of botnet clientDr. Xiang FuDr. Xiang Fu
Malware attacking POS systemsAdam BlaszczykHexacornDexter
Malware discovered developed with Google's "Go" programming languageSteve RaganWired Business MediaEncriyoko
Malware hunting with the Sysinternals toolsMark RussinovichMSDNStuxnet
Malware targeting Windows 8 uses Google DocsTakashi KatsukiSymantecMakadocs
McAfee Labs threat advisory : W32.PinkslipbotMcAfeeAkbot
Measuring botnet populationsJose NazarioArbor SertConficker
Miner
Meet CritXPack (Previously Vintage Pack)KafeineKafeine
Meet ProPack Exploit Pack - yes that's a lot of packKafeineBlogspotLyposit
Meet ‘Flame’, the massive spy malware infiltrating Iranian computersKim ZetterFlame
Members of the largest criminal group engaged in online banking fraud are detainedGroup-IBCarberp
Microsoft and financial services industry leaders target cybercriminal operations from ZeuS botnetsRichard Domingues BoscovichMicrosoftSpyEye
ZeuS
Ice-IX
Microsoft disrupts the emerging Nitol botnet being spread through an unsecure supply chainRichard Domingues BoscovichMicrosoftNitol
MoVP 1.3 Desktops, heaps, and ransomwareMichael Hale LighVolatility labsAccdfisa
Tigger
Monkif botnet hides commands in JPEGsVikas TanejaMcAfee LabsMonkif
More Flame/Skywiper CNC behavior uncoveredAli IslamFireEyeFlame
More details of the Dorifel serversRickey GeversRickey GeversDorifel