Semantic search

Jump to navigation Jump to search
 AuthorEditorBotnet
CVE-2012-4681 - On its way to Sakura Exploit Kit tooKafeine
CVE-2012-4681 - Redkit Exploit Kit - I want Porche TurboKafeine
CVE-2012-4681 - Связка Sweet OrangeKafeine
CVE-2012-5076 - Massively adopted - Blackhole update to 2.0.1Kafeine
Carberp gang evolution: CARO 2012 presentationAleksandr MatrosovESETCarberp
Carberp steals e-cash vouchers from Facebook usersAmit KleinTrusteerCarberp
Carberp, the renaissance ?KafeineCarberp
Carberp-in-the-MobileDenis MaslennikovKaspersky labCarberp
Carberp: it’s not over yetVyacheslav ZakorzhevskyKaspersky labCarberp
Case study of the Miner botnetDaniel Plohmann
Elmar Gerhards-Padilla
4th International Conference on Cyber Con ict
China targets macs used by NGOsF-SecureGhostnet
Citadel : le fichier de configurationFabien PerigaudLEXSICitadel
Citadel V1.3.5.1: enter the fort’s dungeonsLimor KessemRSACitadel
Citadel ZeuS botSherb1nCyber Sleuth
Citadel trojan malware analysisJason MilletaryDELL SecureWorksCitadel
Citadel trojan touts trouble-ticket systemBrian KrebsBrian KrebsCitadel
Citadel: a cyber-criminal’s ultimate weapon?Jérôme SeguraMalwarebytesCitadel
Confidential documents from Japanese politics stolen by malwarePierluigi PaganiniSecurity Affairs
Cool EK : "Hello my friend..." CVE-2012-5076Kafeine
Cool Exploit Kit - A new Browser Exploit Pack on the Battlefield with a "Duqu" like font dropKafeine
Cool exploit kit - URL structureFort Knox Networks
Covert channels over social networksJose SelviSANS Institute
Cracking the encrypted C&C protocol of the ZeroAccess botnetJohn MorrisVirus BulletinZeroAccess
Crisis for Windows sneaks onto virtual machinesTakashi KatsukiSymantecCrisis
Crypto breakthrough shows Flame was designed by world-class scientistsDan GoodinFlame
Crypto experts called on to crack cyberspy tool's encryptionKelly Jackson HigginsUBMGauss
Cutwail drives spike in malicious HTML attachment spamRodel MendrezM86 Security LabsCutwail
Cyber gang seeks botmasters to wage massive wave of trojan attacks against U.S. banksMor AhuviaRSAPrinimalka
DDoS attacks: the Zemra botAlan NevilleSymantecZemra
DISCLOSURE: detecting botnet command and control servers through large-scale NetFlow analysisChristopher Kruegel
Leyla Bilge
Davide Balzarotti
William Robertson
Engin Kirda
ACSAC
DNS: a botnet dialectFrancisco J. Gómez Rodríguez
Carlos Díaz Hidalgo
IniquaMorto
Feederbot
DaRK DDoSseR leads to Gh0st RATNart VilleneuveTrend MicroDaRK DDoSseR
Gh0st RAT
DarkMegi rootkit - sample (distributed via Blackhole)Mila ParkourContagioDarkMegi
Darkmegi: this is not the Rootkit you’re looking forCraig SchmugarMcAfee
De code van Dorifel nader bekekenBrenno de WinterIDGDorifel
Digging inside Tinba malware - A walkthroughAditya K SoodSecNicheTinba
Digging into the Nitol DDoS botnetItai LibaMcAfeeNitol
Dirt Jumper DDoS bot increasingly popularJose NazarioArbor SertDirt Jumper
Disttrack malware overwrites files, infects MBRCris PantanillaTrend MicroDistTrack
Disttrack sabotage malware wipes data at unnamed Middle East energy organizationFahmida Y. RashidWired Business MediaDistTrack
Doctor Web a détecté un botnet enrôlant plus de 550 000 MacDoctor WebFlashback
Doctor Web exposes 550 000 strong Mac botnetDoctor WebFlashback
Domain generation algorithms (DGA) in stealthy malwareGunter OllmannDamballaConficker
Dorifel crypto malware paralyzes Dutch companies and public sectorEmsisoftCitadel
Dorifel
Dorifel is much bigger than expected and it’s still active and growing!David JacobyKaspersky labDorifel
Dorifel virus gereed voor Nederlandse banking phishingHuub RoemDigital InvestigationDorifel
Dorifel/Quervar: the support scammer’s secret weaponDavid HarleyESETDorifel
Dorkbot: conquistando LatinoaméricaPablo RamosESETDorkbot
Dutch users served Sinowal for lunchRoland Dela PazTrendMicroSinowal
EURO WinlockerXylitolXylitolLockScreen.CI
Emerging attack vectors - RSA slide deckEd Skoudis
Etude sur le fonctionnement du Trojan.Matsnu.1 codant les données des utilisateursDr.WebRannoh
Exploring the market for stolen passwordsBrian KrebsBrian KrebsAndromeda
Citadel
FAQ on Kelihos.B/Hlux.B sinkholingDavid DittrichThe Honeynet ProjectKelihos
Fake FBI Ransomware analysisHynek BlinkaAVGReveton
Fast look at an infection by a Blackhole Exploit Kit 2.0Kafeine
Festi botnet analysis & investigationAleksandr Matrosov
Eugene Rodionov
ESETFesti
Flame, Duqu and Stuxnet: in-depth code analysis of mssecmgr.ocxAleksandr Matrosov
Eugene Rodionov
ESETDuqu
Flame
Stuxnet
Flame: replication via Windows Update MITM proxyAleksKaspersky labFlame
Flamer analysis: framework reconstructionAleksandr Matrosov
Eugene Rodionov
ESETFlame
Flamer: highly sophisticated and discreet threat targets the Middle EastSymantecFlame
Flamer: urgent suicideSymantecFlame
Flashfake Mac OS X botnet confirmedIgor SoumenkovKaspersky labFlashback
Fortiguard: Android/Stiniter.A!trFortinet
From Georgia, with love Win32/GeorbotESET
From Sakura to Reveton via Smoke Bot - or a botnet distribution of RevetonKafeineSmoke Bot
Reveton
Full analysis of Flame's Command & Control serversGReATKaspersky labFlame
Full analysis of Flame's command & control serversGReATKaspersky labFlame
Gangstaservice Winlock AffiliateXylitolXyliboxCasier
Gauss: Nation-state cyber-surveillance meets banking TrojanGReATKaspersky labFlame
Gauss
Stuxnet
Gauss: abnormal distributionGReATKaspersky labGauss
Get gamed and rue the day...Methusela Cebrian FerrerMicrosoftAndromeda
Getting more "personal" & deeper into Cridex with parfeit credential stealer infectionHendrik AdrianCridex
Gimemo finally targeting USA with Camera Feature tooKafeineGimemo
Gimemo wants to play in the big leagueKafeineGimemo
Guys behind Gauss and Flame are the sameAli IslamFireEyeFlame
Gauss
Harvesting data on the Xarvester botmasterBrian KrebsBrian KrebsSrizbi
Xarvester
HerpesNet botnet 1.7Lycroft EugeniaToolzwareHerpesNet
IRC bot for AndroidDenis MaslennikovKaspersky lab
Industrial espionage and targeted attacks: understanding the characteristics of an escalating threatOlivier Thonnard
Gavin O’Gorman
Leyla Bilge
Seán Kiernan
Martin Lee
RAID 2012Nitro
Sykipot
Taidoor
Stuxnet
Hydraq
Inside Andromeda Bot v2.06 Webpanel / AKA Gamarue - Botnet Control PanelKafeineAndromeda
Inside Blackhole Exploits Kit v1.2.4 - Exploit Kit Control PanelKafeine
Inside Citadel 1.3.4.5 C&C & Builder - Botnet Control PanelKafeineCitadel
Inside Impact exploit kitKafeineKafeine
Inside Pony 1.7 / Fareit C&C - Botnet Control PanelKafeineMalware don't need cofeePony
Inside Smoke Bot - Botnet Control PanelKafeineSmoke Bot
Inside Smoke Bot - botnet control panelKafeineSmoke Bot
Inside UlockerXylitolULocker
Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control PanelKafeineBlogspotUpas
Inside an APT campaign with multiple targets in India and JapanTrend Micro
Inside the Grum botnetBrian KrebsBrian KrebsGrum
Inside view of Lyposit aka (for its friends) Lucky LOCKERKafeineLyposit
Insights into Win32/BradopMicrosoftBradop
Interconnection of Gauss with Stuxnet, Duqu & FlameEugene RodionovESETDuqu
Flame
Gauss
Stuxnet
Introducing Ponmocup-FinderTom UPonmocup
It’s 2012 and Armageddon has arrivedJeff EdwardsArbor SERT
It’s not the end of the world: DarkComet misses by a mileJeff EdwardsArbor NetworksDarkComet
Java Runtime Environment 1.7 Zero-Day Exploit Delivers BackdoorManuel GatbuntonTrend Labs
Java Zero-Days and the Blackhole Exploit KitJon OliverTrend Micro
Joint strike force against DorifelSurfRightDorifel