Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- The tigger trojan: icky, sticky stuff + (0024 JL)
- The mystery of Duqu: part two + (0025 JL)
- Microsoft and financial services industry leaders target cybercriminal operations from ZeuS botnets + (0025 JL)
- Bredolab severely injured but not dead + (0026 JL)
- Trojan moves its configuration to Twitter, LinkedIn, MSDN and Baidu + (0026 JL)
- More Flame/Skywiper CNC behavior uncovered + (0026 JL)
- OSX/Crisis has been used as part of a targeted attack + (0026 JL)
- Carberp: it’s not over yet + (March 0026 JL)
- Darkness DDoS bot version identification guide + (0027 JL)
- Security Response Android.Counterclank + (0027 JL)
- Android.Counterclank found in official Android market + (0027 JL)
- Herpes botnet + (0027 JL)
- Carberp - a modular information stealing trojan + (0028 JL)
- Citadel ZeuS bot + (0028 JL)
- Botnet shutdown success story: how Kaspersky Lab disabled the Hlux/Kelihos botnet + (0028 JL)
- P2P botnet Kelihos.B with 100.000 nodes sinkholed + (0028 JL)
- Botnet shutdown success story - again: disabling the new Hlux/Kelihos botnet + (0028 JL)
- The Flame: questions and answers + (0028 JL)
- Meet ‘Flame’, the massive spy malware infiltrating Iranian computers + (0028 JL)
- Trusteer warns of new two headed trojan attack against online banks + (0028 JL)
- Clampi/Ligats/Ilomo trojan + (0029 JL)
- OSX.iService its not going to iWork for you + (0029 JL)
- Fortiguard: Android/Stiniter.A!tr + (0029 JL)
- Carberp gang evolution: CARO 2012 presentation + (0029 JL)
- Blackhole, CVE-2012-0507 and Carberp + (0030 JL)
- Analyse statique de Duqu stage 2 + (0030 JL)
- Kelihos/Hlux botnet returns with new techniques + (0031 JL)
- Proactive policy measures by Internet service providers against Botnets + (0199 JL)
- Mocbot spam analysis + (August 15, 2006)
- Peer-to-peer botnets: overview and case study + (2007)
- Poison Ivy 2.3.0 Documentation + (2007)
- Mpack installs ultra-invisible trojan + (July 5, 2007)
- The world's biggest botnets + (September 11, 2007)
- Bot Roast II nets 8 individuals + (November 29, 2007)
- Operation Bot Roast II + (November 29, 2007)
- SGNET: a worldwide deployable framework to support the analysis of malware threat models + (2008)
- Top spam botnets exposed + (April 8, 2008)
- Encyclopedia entry: Win32/Oderoor + (April 17, 2008)
- Kraken botnet infiltration + (April 28, 2008)
- Owning Kraken zombies + (April 28, 2008)
- The Coreflood report + (August 6, 2008)
- Research Win32/Slenfbot + (August 16, 2008)
- One Sinowal trojan + one gang = hundreds of thousands of compromised accountS + (October 31, 2008)
- Un WOMBAT pour évaluer la cybercriminalité + (2009)
- Xarvester, the new Srizbi? + (January 12, 2009)
- OSX.Iservice technical details + (January 22, 2009)
- 'Tigger' trojan keeps security researchers hopping + (March 4, 2009)
- Cimbot - A technical analysis + (March 16, 2009)
- Stealthy router-based botnet worm squirming + (March 23, 2009)
- A Foray into Conficker’s Logic and Rendezvous Points + (April 22, 2009)
- Adrenalin botnet. The trend marks the Russian crimeware + (May 10, 2009)
- Gumblar Google-poisoning attack morphs + (May 19, 2009)
- Hébergeurs malhonnêtes : nouvelle fermeture (3FN) + (June 6, 2009)
- Twitter + Pastebin = malware update + (August 17, 2009)
- A study of the Ilomo / Clampi botnet + (August 20, 2009)
- Google Groups trojan + (September 11, 2009)
- The Waledac protocol: the how and why + (October 13, 2009)
- Trojan.Whitewell: what’s your (bot) Facebook status today? + (October 31, 2009)
- Your botnet is my botnet: analysis of a botnet takeover + (November 9, 2009)
- Russian service online to check the detection of malware + (November 26, 2009)
- SDBot IRC botnet continues to make waves + (December 2009)
- Virus scanners for virus authors + (December 31, 2009)
- Réflexions pour un plan d'action contre les botnets + (2010)
- Overcoming reputation and proof-of-work systems in botnets + (2010)
- The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet + (2010)
- The case of TDL3 + (2010)
- On the analysis of the ZeuS botnet crimeware toolkit + (2010)
- Insights from the analysis of the Mariposa botnet + (2010)
- Cracking down on botnets + (February 24, 2010)
- Koobface, un écosystème cybercriminel ou le conte des Mille et une nuits ? + (February 24, 2010)
- Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware + (March 2010)
- Massive Drop in number of active Zeus C&C servers + (March 10, 2010)
- Virus scanners for virus authors, part II + (April 5, 2010)
- Using libemu to create malware flow graph + (April 26, 2010)
- All-in-one malware: an overview of Sality + (May 7, 2010)
- The Sality botnet + (May 14, 2010)
- Tequila botnet leads to phishing attack + (June 11, 2010)
- Conficker working group: lessons learned + (June 17, 2010)
- The anatomy of a botnet + (August 23, 2010)
- Malware pandemics + (September 1, 2010)
- Discerning relationships: the Mexican botnet connection + (September 2010)
- The IMDDOS botnet: discovery and analysis + (September 13, 2010)
- Mexican Twitter-controlled botnet unpicked + (September 15, 2010)
- Another family of DDoS bots: Avzhan + (September 22, 2010)
- Security experts detected new Twitter-controlled botnet + (September 27, 2010)
- Feodo - a new botnet on the rise + (October 21, 2010)
- Avalanche phishers migrate to ZeuS + (October 25, 2010)
- Researchers: Bredolab still lurking, though severely injured + (October 28, 2010)
- Hiloti: the (bot)master of disguise + (November 8, 2010)
- New IE Zero-Day used in targeted attacks + (November 8, 2010)
- Bleeding Life Exploit Pack + (November 23, 2010)
- VinSelf - A new backdoor in town + (November 23, 2010)
- Leouncia - Yet another backdoor + (December 14, 2010)
- Leouncia - Yet another backdoor - Part 2 + (December 14, 2010)
- Encyclopedia entry: Win32/Carberp + (2011)
- HARMUR: storing and analyzing historic data on malicious domains + (2011)
- BareBox: efficient malware analysis on bare-metal + (2011)
- Top 50 bad hosts & networks 2011 Q4 + (2011)
- Shedding light on the NeoSploit Exploit Kit + (January 4, 2011)
- Spambot evolution 2011 + (February 15, 2011)
- Tatanga: a new banking trojan with MitB functions + (February 25, 2011)