Semantic search

Jump to navigation Jump to search
 AuthorEditorBotnet
Tales from Crisis, Chapter 1: The dropper’s box of tricksOsxreverserOsxreverserCrisis
Tales from Crisis, Chapter 2: Backdoor’s first stepsOsxreverserOsxreverserCrisis
Tales from Crisis, Chapter 3: The Italian rootkit jobOsxreverserOsxreverserCrisis
Tales from Crisis, Chapter 4: a ghost in the networkOsxreverserOsxreverserCrisis
Targeted destructive malware explained: Troj/Mdrop-ELDPaul BaccasSophos LabsDistTrack
Tatanga attack exposes chipTAN weaknessesAmit KleinTrusteerTatanga
The ACCDFISA malware family – Ransomware targeting Windows serversFabian WosarEmsisoftAccdfisa
The ACCDFISA malware family – Ransomware targetting Windows serversEmsisoft LabAccdfisa
The Cridex trojan targets 137 financial organizations in one goDaniel ChechikM86 Security LabsSpyEye
Carberp
Cridex
ZeuS
The Dorkbot risesBernadette IrincoTrend MicroDorkbot
The Elderwood project (infographic)Symantec
The Flame: questions and answersAlexander GostevKaspersky labFlame
The Madi campaign - Part IINicolas BrulezKaspersky labMadi
The Mirage campaignSilas CutlerDELL SecureWorksMirage
The Pobelka botnet - a command and control case studyRickey GeversDigital InvestigationCitadel
Pobelka
The ZeroAccess botnet: mining and fraud for massive financial gainJames WykeSophos LabsZeroAccess
The ZeroAccess rootkitJames WykeSophosZeroAccess
The first trojan in history to steal Linux and Mac OS X passwordsDr. WebDr.WebWirenet
The lifecycle of peer-to-peer (Gameover) ZeuSBrett Stone-GrossDELL SecureWorksCutwail
Dirt Jumper
Gameover
Pony
The mystery of Duqu framework solvedIgor SoumenkovKaspersky labDuqu
The mystery of Duqu: part tenAlexander GostevKaspersky labDuqu
The mystery of the Duqu frameworkIgor SoumenkovKaspersky labDuqu
The where and why of HluxSergey GolovanovKaspersky labBredolab
Kelihos
Virut
Gbot
The ‘Madi’ infostealers - a detailed analysisNicolas BrulezKaspersky labMadi
The “Hikit” rootkit: advanced and persistent attack techniques (part 1)Christopher Glyer
Ryan Kazanciyan
MandiantHikit
The “Hikit” rootkit: advanced and persistent attack techniques (part 2)Christopher Glyer
Ryan Kazanciyan
MandiantHikit
Tilon-son of SilonAmit KleinTrusteerSilon
Tilon
Top 50 bad hosts & networks 2011 Q4Jart Armin
Steve Burn
Greg Feezel
David Glosser
Niels Groeneveld
Tim Karpinsky
Bogdan Vovchenko
Will Rogofsky
Philip Stranger
Bryn Thompson
HostExploitDirt Jumper
ZeuS
Tracking down the author of the PlugX RATJaime BlascoAlienvaultPlugX
Trojan moves its configuration to Twitter, LinkedIn, MSDN and BaiduSnorre FagerlandNorman
Trojan on the loose: an in-depth analysis of police trojanFeike Hacquebord
David Sancho
Trend MicroGoldenbaks
Trojan.Prinimalka: bits and piecesDennis SchwarzArbor NetworksGozi
Prinimalka
Trojan.Taidoor takes aim at policy think tanksStephen Doherty
Piotr Krysiu
SymantecTaidoor
Trojan.Tatanarg.B careful!Stephen DohertySymantecTatanarg
Spamuzle
Trojan.ZeroAccess infection analysisSean Hittel
Rong Zhou
SymantecZeroAccess
Unexpected reboot: NecursTim LiuMicrosoftNecurs
Unveiling the network criminal infrastructure of TDSS/TDL4 - DGAv14: a case study on a new TDSS/TDL4 variantManos Antonakakis
Jeremy Demar
David Dagon
Kevin Stevens
DamballaTDL-4
DGAv14
Upas Kit (aka Rombrast) integrates webinjectsKafeineBlogspotUpas
Update to Citadel : 1.3.5.1 Rain Edition.KafeineCitadel
Update to Citadel : v.1.3.4.5KafeineCitadel
Urausy has big plan for Europe - Targeting 3 new countries among which Norway !KafeineUrausy
Urausy improving its localization - A (the\?) Gaelic Ransomware with Interpol impersonation as default landingKafeineBlogspotUrausy
Virus Gendarmerie : variante Office Centrale de Luttre contre la criminalité – controle informationnelMalekal MorteMalekalEpubb
W32.Changeup: how the worm was createdMasaki SuenagaSymantec
W32.Flamer: spreading mechanism tricks and exploitsSymantecFlame
W32.Shadesrat (Blackshades) author arrestedSymantecBlackShades
W32.Tinba (Tinybanker) The turkish incidentPeter KruseTrend MicroTinba
Weelsof use SSL C&CXylitolXylitolWeelsof
What was that Wiper thing?GReATKaspersky labWiper
What’s the buzz with BafruzMicrosoftRannoh
Bafruz
Who's behind the Koobface botnet? - An OSINT analysisDancho DanchevKoobface
Who's behind the world's largest spam botnet?Brian KrebsBrian KrebsGrum
Win32/Gataka - or should we say Zutick?Jean-Ian BoutinESETTatanga
Tinba
Win32/Gataka banking Trojan - Detailed analysisJean-Ian BoutinESETTatanga
Win32/Gataka: a banking Trojan ready to take offJean-Ian BoutinESETSpyEye
Tatanga
Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systemsAleksandr MatrosovESETRanbyus
Winlock affiliateXylitolXylitolRansom.II
XPAJ: reversing a Windows x64 bootkitVyacheslav RusakovKaspersky labXpaj
You dirty RAT! Part 1 – DarkCometAdam KujawaMalwarebytesDarkComet
You dirty RAT! part 2 – BlackShades NETAdam KujawaMalwarebytesBlackShades
DarkComet
ZACCESS/SIREFEF arrives with new infection techniqueManuel GatbuntonTrend MicroZeroAccess
ZeroAccess - new steps in evolutionArtem I. BaranovArtem BaranovZeroAccess
ZeroAccess's way of self-deletionWayneF-SecureZeroAccess
ZeroAccess: code injection chroniclesAleksandr MatrosovESETZeroAccess
ZeuS Gameover overviewGiuseppe BonfàMinded Security Research LabGameover
ZeuS ransomware feature: win unlockMikko S.
Marko
F-SecureZeuS
ZeuS v2 Malware Analysis - Part IIPatrick OlsenSystem Forensics
ZeuS – P2P+DGA variant – mapping out and understanding the threatCERT Polska BlogCERT PolskaGameover
ZeuS
ZeuS: me talk pretty Finnish one dayF-SecureZeuS
ZeuSbot/Spyeye P2P updated, fortifying the botnetAndrea LelliSymantecSpyEye
ZeuS
Kelihos
Waledac
Новый сэмпл Pandora DDoS BotOntharPandora
‘Dexter’ virus targets point-of-sale terminalsVito PilieciPostmedia Network Inc.Dexter
‘Project Blitzkrieg’ promises more aggressive cyberheists against U.S. banksBrian KrebsBrian KrebsPrinimalka