Semantic search

Jump to navigation Jump to search
 AuthorEditorBotnet
"NetTraveler is Running!" - Red Star APT attacks compromise high-profile victimsGReATKaspersky labNetTraveler
"njRAT" UncoveredFidelisFidelis cybersecurityNjRAT
APT1: technical backstageMalware.lu
Paul Rascagnères
Malware.luFakeM
Poison Ivy
Adobe Flash Player 0-day and HackingTeam's Remote Control SystemSergey GolovanovKaspersky lab
Alina: casting a shadow on POSJosh GrunzweigTrustwaveAlina
VSkimmer
BlackPOS
Alina: following the shadow part 1Josh GrunzweigTrustwaveAlina
Alina: following the shadow part 2Josh GrunzweigTrustwaveAlina
An encounter with trojan NapAli Islam
Abhishek Singh
FireEyeKelihos
An overview of messaging botnetsFrançois PagetMcAfeeCutwail
Bagle
Bobax
Kraken
Pushdo
Donbot
Festi
Fivetoone
Grum
Kelihos
Lethic
Maazben
Rustock
Waledac
Slenfbot
Darkmailer
Analyse of the sample cdorked.AJvoisinMalware.lu
Analysis of a PlugX malware variant used for targeted attacksCIRCLCIRCLPlugX
Analysis of a stage 3 Miniduke malware sampleCIRCLMiniDuke
Analysis of the malware of Red October - Part 1RootBSD
Malware.lu
Malware.luRocra
Analysis of the malware of Red October - Part 2RootBSD
Malware.lu
Malware.luRocra
Apache binary backdoors on Cpanel-based serversDaniel CidSucuri
Attention! All data on your hardrive is encryptedTomas Prochazka
Michal Cebak
AVGRannoh
Avatar rootkit: the continuing sagaAleksandr Matrosov
Eugene Rodionov
Anton Cherepanov
ESET WelivesecurityAvatar
Backdoor uses Evernote as command and control serverNikko TamañaTrend MicroVernot
Black Dragon: "... and all will burn beneath the shadow of my wings"MalwageddonMalwageddon
Blackhole and Cool Exploit kits nearly extinctDennis FisherThreatpostCutwail
Reveton
Bot herders build newer versions of previous botnet WaledacSPAMfighterVirut
Waledac
CVE-2013-1493 (jre17u15 - jre16u41) integrating exploit kitsKafeineKafeineUrausy
CVE-2013-2465/CVE-2013-2471/CVE-2013-2463 integrating Exploit Kits -- jre7u21 CVE- jre6u45 and earlierKafeineMalware don't need cofee
Carberp-based trojan attacking SAPGeoff McDonaldMicrosoft Malware Protection CentreCarberp
Gamker
Chameleon botnet grabbed $6m A MONTH from online ad-slingersJohn LeydenChameleon
Citadel plitfi botnet reportCERT PolskaCitadel
Collateral damage: Microsoft hits security researchers along with CitadelAbuse.chCitadel
Cross-platform Frutas RAT builder and back doorJoseph BinghamSymantecFrutas
Demystifying PobelkaMichael SandeeFox-ITSpyEye
Citadel
Pobelka
Department of Labor strategic web compromiseMatt DahlCrowdstrikePoison Ivy
Detecting extended attributes (ZeroAccess) and other Frankenstein’s monsters with HMFTHexacornZeroAccess
Discovered: botnet costing display advertisers over six million dollars per monthSpider.ioChameleon
File infector Expiro hits US, steals FTP credentialsRhena InocencioTrend MicroExpiro
First widespread virus cross-infectionJeet MorpariaSymantecExpiro
Five charged in largest hacking scheme ever prosecuted in USRyan NaraineSecurityWeek
Going solo: self-propagating ZBOT malware spottedAbigail Pichel
Joie Salvio
Alvin Bacani
Trend MicroZeuS
Got malware? Rent an exploit serviceKevin StevensDamballa
Hello Neutrino ! (just one more Exploit Kit)KafeineKafeine
Hesperbot – A new, advanced banking trojan in the wildRobert Lipovsky
Anton Cherepanov
ESETHesperbot
Hiding in plain sight: the FAKEM remote access trojanNart VilleneuveTrend MicroFakeM
Infamous Skynet botnet author allegedly arrestedMalwareTechMalwareTechSkynet
Inside the world of the Citadel trojanRyan SherstobitoffMcAfeeCitadel
Internet Census 2012, port scanning /0 using insecure embedded devicesCarna BotnetCarna
Kelihos botnet appears again with new variantJay PfoutzSecure ConnexionKelihos
Kelihos is dead… No wait… Long live Kelihos! Again!Phil HayTrustwaveKelihos
Kore exploit kitDarrylKahu Security
Latest Kelihos botnet shut down live at RSA Conference 2013Michael MimosoKaspersky labKelihos
Lifting the lid on the Redkit exploit kit (Part 1)Fraser HowardSophos Labs
Linux/Cdorked.A: New Apache backdoor being used in the wild to serve BlackholePierre-Marc BureauESET
Look what I found: it's a Pony!Anat DavidiTrustwavePony
MDK: the largest mobile botnet in ChinaFlora LiuSymantecMDK
Bmaster
Mac spyware found at Oslo Freedom ForumSean SullivanF-SecureHangOver
Malware evolving to defeat anti-DDoS services like CloudFlare?Alexis Dorais-JoncasESETOutFlare
Mariposa botnet 'mastermind' jailed in SloveniaBBCMariposa
Massive search fraud botnet seized by Microsoft and SymantecSean GallagherCondé NastBamital
Mastermind behind Gozi bank malware charged along with two othersKim ZetterCondé NastGozi
Measuring and detecting malware downloads in live network trafficManos Antonakakis
Babak Rahbarinia
Roberto Perdisci
Kang Li
Phani Vadrevu
ESORICS
Meet "Red Dot exploit toolkit"KafeineMalware don't need cofee
Microsoft and Symantec take down Bamital botnet that hijacks online searchesRichard BoscovichMicrosoftBamital
MinidukeCrySyS LabMiniDuke
Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communicationAleksandr MatrosovESETAvatar
NASK shuts down dangerous Virut botnet domainsCERT PolskaVirut
NetTraveler is back: the 'Red Star' APT returns with new tricksCostin RaiuKaspersky labNetTraveler
New CryptoLocker spreads via removable drivesAbigail PichelTrend MicroCryptoLocker
New Mac malware discovered on attendee computer at anti-surveillance workshopBrian DonohueKaspersky labHangOver
New crimeware attacks LatAm bank usersJorge MieresKaspersky labPiceBOT
VOlk
S.A.P.Z.
Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilitiesDancho DanchevWebroot
Nymaim - obfuscation chroniclesJean-Ian BoutinESETNymaim
OSX Kitmos analysisSteeve BarbeauSteeve BarbeauHangOver
PeerRush: mining for unwanted P2P trafficBabak Rahbarinia
Roberto Perdisci
Andrea Lanzi
Kang Li
Conference on Detection of Intrusions and Malware & Vulnerability Assessment
PokerAgent botnet stealing over 16,000 Facebook credentialsRobert LipovskyESETPokerAgent
Qadars: un nouveau malware bancaire avec un composant mobileDaniel LunghiLEXSIQadars
Reversing Andromeda-Gamarue botnetRashid BhattGarage 4 HackersAndromeda
SPL exploit kit – now with CVE-2013-0422Denis Laskov
Secrets of the Comfoo mastersJoe Stewart
Don Jackson
DELL SecureWorksComfoo
Stealing money from ATMs with malwareAnonymousCCC 30C3
Stealthy peer-to-peer C&C over SMB pipesRaphael MudgeStrategic Cyber LLCDuqu
Survey on network-based botnet detection methodsSebastián García
Alejandro Zunino
Marcelo Campo
John Wiley & Sons, Ltd.
Takeover of Virut domainsCERT PolskaVirut
Targeted information stealing attacks in South Asia use email, signed binariesJean-Ian BoutinESETHangOver
The "Red October" campaign - An advanced cyber espionage network targeting diplomatic and government agenciesGReATKaspersky labRocra
The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoorGReATKaspersky labMiniDuke
The ZeroAccess botnet revealedAditya BalapureInfosec InstituteZeroAccess
The life cycle of web server botnet recruitmentRyan BarnettTrustwave
The most sophisticated Android trojanRoman UnuchekKaspersky labObad
The rise of TOR-based botnetsAleksandr MatrosovESETAtrax
PTA
Travnet botnet steals huge amount of sensitive dataUmesh WanveMcAfeeTravnet
Travnet trojan could be part of APT campaignVikas TanejaMcAfeeTravnet
Trojan ChePro, the CPL stormFabio AssoliniKaspersky SecurelistChePro
Trojan Nap aka Kelihos/Hlux - Feb. 2013 status updateMila ParkourDeepEnd ResearchKelihos
Trojan horse using sender policy frameworkTakashi KatsukiSymantecSpachanel
Trojan.Ransomgerpo criminal arrestedSymantec Security ResponseSymantecRansom.EY
Under the hood of the cyber attack on U.S. banksRonen AtiasIncapsula
Unveiling an Indian cyberattack infrastructure - a special reportSnorre Fagerland
Morten Kråkvik
Jonathan Camp
Ned Moran
NormanHangOver
Urausy ransomware - July 2013 design refresh - "Summer 2013 collection"KafeineKafeineUrausy
Urausy: Colorfull design refresh (+HR) & EC3 LogoKafeineKafeineUrausy
Versatile and infectious: Win64/Expiro is a cross-platform file infectorArtem I. BaranovESETExpiro
Virut malware fuels Waledac botnet resurgenceDanielle WalkerHaymarket Media, IncVirut
Waledac
Waledac gets cozy with VirutDenis CarmodySymantecVirut
Waledac
Walking through Win32/Jabberbot.A instant messaging C&CAlexis Dorais-JoncasESETJabberbot
Why forums? An empirical analysis into the facilitating factors of carding forumsMichael Yip
Nigel Shadbolt
Craig Webber
WebSci '13 Proceedings of the 5th Annual ACM Web Science Conference
Win32/64:Napolar: New trojan shines on the cyber crime-scenePeter KálnaiAvastSolar
Win32/VundoJireh Sanico
Jaime Wong
MicrosoftPonmocup
ZeroAccess anti-debug uses debuggerJoshua CannellMalwarebytesZeroAccess
ZeuS-P2P monitoring and analysisCERT Polska
Nask
CERT PolskaGameover