Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- CVE-2012-4681 - On its way to Sakura Exploit Kit too +
- CVE-2012-4681 - Redkit Exploit Kit - I want Porche Turbo +
- CVE-2012-4681 - Связка Sweet Orange +
- CVE-2012-5076 - Massively adopted - Blackhole update to 2.0.1 +
- Carberp gang evolution: CARO 2012 presentation +
- Carberp steals e-cash vouchers from Facebook users +
- Carberp, the renaissance ? +
- Carberp-in-the-Mobile +
- Carberp: it’s not over yet +
- Case study of the Miner botnet +
- China targets macs used by NGOs +
- Citadel : le fichier de configuration +
- Citadel V1.3.5.1: enter the fort’s dungeons +
- Citadel ZeuS bot +
- Citadel trojan malware analysis +
- Citadel trojan touts trouble-ticket system +
- Citadel: a cyber-criminal’s ultimate weapon? +
- Confidential documents from Japanese politics stolen by malware +
- Cool EK : "Hello my friend..." CVE-2012-5076 +
- Cool Exploit Kit - A new Browser Exploit Pack on the Battlefield with a "Duqu" like font drop +
- Cool exploit kit - URL structure +
- Covert channels over social networks +
- Cracking the encrypted C&C protocol of the ZeroAccess botnet +
- Crisis for Windows sneaks onto virtual machines +
- Crypto breakthrough shows Flame was designed by world-class scientists +
- Crypto experts called on to crack cyberspy tool's encryption +
- Cutwail drives spike in malicious HTML attachment spam +
- Cyber gang seeks botmasters to wage massive wave of trojan attacks against U.S. banks +
- DDoS attacks: the Zemra bot +
- DISCLOSURE: detecting botnet command and control servers through large-scale NetFlow analysis +
- DNS: a botnet dialect +
- DaRK DDoSseR leads to Gh0st RAT +
- DarkMegi rootkit - sample (distributed via Blackhole) +
- Darkmegi: this is not the Rootkit you’re looking for +
- De code van Dorifel nader bekeken +
- Digging inside Tinba malware - A walkthrough +
- Digging into the Nitol DDoS botnet +
- Dirt Jumper DDoS bot increasingly popular +
- Disttrack malware overwrites files, infects MBR +
- Disttrack sabotage malware wipes data at unnamed Middle East energy organization +
- Doctor Web a détecté un botnet enrôlant plus de 550 000 Mac +
- Doctor Web exposes 550 000 strong Mac botnet +
- Domain generation algorithms (DGA) in stealthy malware +
- Dorifel crypto malware paralyzes Dutch companies and public sector +
- Dorifel is much bigger than expected and it’s still active and growing! +
- Dorifel virus gereed voor Nederlandse banking phishing +
- Dorifel/Quervar: the support scammer’s secret weapon +
- Dorkbot: conquistando Latinoamérica +
- Dutch users served Sinowal for lunch +
- EURO Winlocker +
- Emerging attack vectors - RSA slide deck +
- Etude sur le fonctionnement du Trojan.Matsnu.1 codant les données des utilisateurs +
- Exploring the market for stolen passwords +
- FAQ on Kelihos.B/Hlux.B sinkholing +
- Fake FBI Ransomware analysis +
- Fast look at an infection by a Blackhole Exploit Kit 2.0 +
- Festi botnet analysis & investigation +
- Flame, Duqu and Stuxnet: in-depth code analysis of mssecmgr.ocx +
- Flame: replication via Windows Update MITM proxy +
- Flamer analysis: framework reconstruction +
- Flamer: highly sophisticated and discreet threat targets the Middle East +
- Flamer: urgent suicide +
- Flashfake Mac OS X botnet confirmed +
- Fortiguard: Android/Stiniter.A!tr +
- From Georgia, with love Win32/Georbot +
- From Sakura to Reveton via Smoke Bot - or a botnet distribution of Reveton +
- Full analysis of Flame's Command & Control servers +
- Full analysis of Flame's command & control servers +
- Gangstaservice Winlock Affiliate +
- Gauss: Nation-state cyber-surveillance meets banking Trojan +
- Gauss: abnormal distribution +
- Get gamed and rue the day... +
- Getting more "personal" & deeper into Cridex with parfeit credential stealer infection +
- Gimemo finally targeting USA with Camera Feature too +
- Gimemo wants to play in the big league +
- Guys behind Gauss and Flame are the same +
- Harvesting data on the Xarvester botmaster +
- HerpesNet botnet 1.7 +
- IRC bot for Android +
- Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat +
- Inside Andromeda Bot v2.06 Webpanel / AKA Gamarue - Botnet Control Panel +
- Inside Blackhole Exploits Kit v1.2.4 - Exploit Kit Control Panel +
- Inside Citadel 1.3.4.5 C&C & Builder - Botnet Control Panel +
- Inside Impact exploit kit +
- Inside Pony 1.7 / Fareit C&C - Botnet Control Panel +
- Inside Smoke Bot - Botnet Control Panel +
- Inside Smoke Bot - botnet control panel +
- Inside Ulocker +
- Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control Panel +
- Inside an APT campaign with multiple targets in India and Japan +
- Inside the Grum botnet +
- Inside view of Lyposit aka (for its friends) Lucky LOCKER +
- Insights into Win32/Bradop +
- Interconnection of Gauss with Stuxnet, Duqu & Flame +
- Introducing Ponmocup-Finder +
- It’s 2012 and Armageddon has arrived +
- It’s not the end of the world: DarkComet misses by a mile +
- Java Runtime Environment 1.7 Zero-Day Exploit Delivers Backdoor +
- Java Zero-Days and the Blackhole Exploit Kit +
- Joint strike force against Dorifel +
- Karagny.L unpack +
- Kaspersky Lab et Seculert annoncent la récente découverte de « Madi », une nouvelle attaque de cyberespionnage au Moyen‑Orient +
- Kelihos back in town using Fast Flux +
- Kelihos is dead. Long live Kelihos +
- Kelihos/Hlux botnet returns with new techniques +
- Kelihos: not alien resurrection, more attack of the clones +
- King of spam:Festi botnet analysis +
- Koobface botnet master KrotReal back in business, distributes ransomware and promotes BHSEO service/product +
- Large-scale analysis of malware downloaders +
- Latest SpyEye botnet active and cheaper +
- Learning stateful models for network honeypots +
- Legal implications of countering botnets +
- Library file in certain Android apps connects to C&C servers +
- Long life to Kelihos! +
- MP-DDoser: A rapidly improving DDoS threat +
- MP-DDoser:Monitoring a rapidly improving DDoS threat +
- MSRT April 2012: Win32/Claretore +
- MSRT June '12 - cleanup on aisle one +
- MSRT March 2012: breaking bad +
- MSRT November '12 - Weelsof around the world +
- MSRT September '12 - Medfos, hijacking your daily search +
- MSRT march: three hioles in one +
- Mac BackDoor.Wirenet.1 config extractor +
- Mac Flashback exploiting unpatched Java vulnerability +
- Madi is back - New Tricks and a new Command&Control server +
- Mahdi malware finds 150 new targets including U.S. and Germany, gets more evasive +
- Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-mode +
- Malicious Apache module injects Iframes +
- Malicious Apache module used for content injection: Linux/Chapro.A +
- Malware 2 - from infection to persistence +
- Malware Memory Analysis - Volatility +
- Malware Uses Google Go Language +
- Malware analysis Rannoh/Matsnu +
- Malware analysis tutorial 32: exploration of botnet client +
- Malware attacking POS systems +
- Malware discovered developed with Google's "Go" programming language +
- Malware hunting with the Sysinternals tools +
- Malware targeting Windows 8 uses Google Docs +
- McAfee Labs threat advisory : W32.Pinkslipbot +
- Measuring botnet populations +
- Meet CritXPack (Previously Vintage Pack) +
- Meet ProPack Exploit Pack - yes that's a lot of pack +
- Meet ‘Flame’, the massive spy malware infiltrating Iranian computers +
- Members of the largest criminal group engaged in online banking fraud are detained +
- Microsoft and financial services industry leaders target cybercriminal operations from ZeuS botnets +
- Microsoft disrupts the emerging Nitol botnet being spread through an unsecure supply chain +
- MoVP 1.3 Desktops, heaps, and ransomware +
- Monkif botnet hides commands in JPEGs +
- More Flame/Skywiper CNC behavior uncovered +
- More details of the Dorifel servers +
- Multitenancy Botnets thwart threat analysis +
- NGRBot spreads via chat +
- Necurs Quick Analysis +
- Neosploit gets Java 0-Day +
- Nepalese government websites compromised to serve Zegost RAT +
- New Apple Mac trojan called OSX/Crisis discovered +
- New Chinese exploit pack +
- New Duqu sample found in the wild +
- New Mahdi updates, new C2 server +
- New Thor botnet nearly ready to be sold, price $8,000 +
- New Xtreme RAT attacks US, Israel, and other foreign governments +
- New ransomware plays its victims an audio file, over and over and over… +
- New trojan found: Admin.HLP leaks organizations data +
- New virus SMSZombie.A discovered by TrustGo Security Labs +
- Newly detected Crisis virus infects Windows, Macs and virtual machines +
- Nitol DDoS botnet discovered in China +
- Not just a one-trick PonyDOS +
- Now you Z-(eus) it, now you don’t: ZeuS bots silently upgraded to Citadel +
- Nuevo botnet contra Mexico: Karn!v0r3x +
- OSX/Crisis has been used as part of a targeted attack +
- OSX/Flashback - The first malware to infect hundreds of thousands of Apple Mac +
- Obama order sped up wave of cyberattacks against Iran +
- Olmasco bootkit: next circle of TDL4 evolution (or not) +
- One bot to rule them all +
- Over 9 million PCs infected - ZeroAccess botnet uncovered +
- P2P botnet Kelihos.B with 100.000 nodes sinkholed +
- Panda Security uncovers bot-killing malware +
- Panel Gendarmerie +
- Panel Supern0va et virus gendarmerie +
- Panel Virus Gendarmerie : Ratio 0.36% +
- Part virus, part botnet, spreading fast: Ramnit moves past Facebook passwords +
- Playing cops & robbers with banks & browsers +
- PlugX: new tool for a not so new campaign +
- Police Trojan crosses the Atlantic, now targets USA and Canada +
- Ponmocup analysis +
- Pramro and Sality - two PEs in a pod +
- Proactive detection of security incidents II - Honeypots +
- Proactive policy measures by Internet service providers against Botnets +
- Probing the Gozi-Prinimalka campaign +
- Quervar – Induc.C reincarnate +
- QuickPost: Flame & Volatility +
- Ramnit goes social +
- Ransom.II - UGC payment for USA - Windows Genuine impersonation for DE +
- Ransomware : Smile you're on camera - Reveton.C new landing pages +
- Ransomware Casier - Sharing Design with Lyposit - Gaelic & Persian ( +
- Ransomware Fake Microsoft Security Essentials +
- Ransomware and Silence Locker control panel +
- Ransomware crimeware kits +
- Ransomware gets professional, targeting Switzerland, Germany and Austria +
- Ransomware « Trojan.Casier » Panel +
- Ransomware ‘Holds Up’ victims +
- Ransomware: playing on your fears +
- Redkit - one account = one color +
- Redkit : No more money ! Traffic US, CA, GB, AU +
- Relentless Zbot and anti-emulations +
- Reversing malware loaders - The Matsnu-A Case +
- Reversing the wrath of Khan +
- Reveton += HU, LV, SK, SI, TR (!), RO - So spreading accross Europe with 6 new Design +
- Reveton Autumn Collection += AU,CZ, IE, NO & 17 new design +
- Reveton can speak now ! +
- Reveton.A +
- Richard Clarke on who was behind the Stuxnet attack +
- Rmnet.12 created a million Windows computer botnet +
- RootSmart Android malware +
- RootSmart malware utilizes GingerBreak root exploit +
- Rovnix Reloaded: new step of evolution +
- Rovnix bootkit framework updated +
- Rovnix.D: the code injection story +
- SIM-ple: mobile handsets are weak link in latest online banking fraud scheme +
- SIRv12 +
- SIRv12: the obstinacy of Conficker +
- SKyWIper: A complex malware for targeted attacks +
- Saudi Aramco hit by computer virus +
- Say hello to Tinba: world’s smallest trojan-banker +
- Scareware locks down computer due to child porn and terrorism +
- Security Response Android.Counterclank +
- Security alert: SpamSoldier +
- Security alert: new Android malware - TigerBot - identified in alternative markets +
- Security alert: new TGLoader Android malware utilizes the exploid root exploit +
- Security alert: new variants of Legacy Native (LeNa) identified +
- Shamoon the Wiper in details +
- Shamoon the Wiper: further details (Part II) +
- Shamoon the wiper - copycats at work +
- Shylock financial malware back 'with a vengeance' +
- Sinowal analysis (Windows 7, 32-bit) +
- Sinowal: MBR rootkit never dies! (and it always brings some new clever features) +
- Skynet, a Tor-powered botnet straight from Reddit +
- Smartcard vulnerabilities in modern banking malware +
- Sopelka Botnet: three banking trojans and one banking panel +
- Spam botnets: The fall of Grum and the rise of Festi +
- SpyEye being kicked to the curb by its customers? +
- Stamp EK (aka SofosFO) now showing "Blackhole 2.0 Like" landing pages +
- Static analysis of Dalvik bytecode and reflection in Android +
- Study of malware obfuscation techniques +
- Symantec/Android.Ackposts +
- Symantec/Android.Maistealer +
- Symantec/Backdoor.Arcomrat +
- TDI - a new element in old TDSS story +
- TDL4 reloaded: Purple Haze all in my brain +
- TDSS botnet: full disclosure +