Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- ZeuS Gameover overview + (September 25, 2012)
- Java Runtime Environment 1.7 Zero-Day Exploit Delivers Backdoor + (September 28, 2012)
- Blackhole & Cridex: season 2 episode 1: Intuit spam & SSL traffic analysis + (October 4, 2012)
- Cyber gang seeks botmasters to wage massive wave of trojan attacks against U.S. banks + (October 4, 2012)
- Update to Citadel : 1.3.5.1 Rain Edition. + (October 4, 2012)
- More details of the Dorifel servers + (October 8, 2012)
- New ransomware plays its victims an audio file, over and over and over… + (October 8, 2012)
- TDI - a new element in old TDSS story + (October 8, 2012)
- ‘Project Blitzkrieg’ promises more aggressive cyberheists against U.S. banks + (October 8, 2012)
- Cool Exploit Kit - A new Browser Exploit Pack on the Battlefield with a "Duqu" like font drop + (October 9, 2012)
- BoteAR: a “social botnet”- What are we talking about + (October 11, 2012)
- Study of malware obfuscation techniques + (October 11, 2012)
- Reveton Autumn Collection += AU,CZ, IE, NO & 17 new design + (October 12, 2012)
- An overview of exploit packs + (October 12, 2012)
- The Dorkbot rises + (October 16, 2012)
- Sopelka Botnet: three banking trojans and one banking panel + (October 17, 2012)
- Citadel V1.3.5.1: enter the fort’s dungeons + (October 18, 2012)
- Olmasco bootkit: next circle of TDL4 evolution (or not) + (October 18, 2012)
- Stamp EK (aka SofosFO) now showing "Blackhole 2.0 Like" landing pages + (October 18, 2012)
- Blackhole exploit kit v2 on the rise + (October 19, 2012)
- Analysis of TDL4 + (October 20, 2012)
- Trojan.Prinimalka: bits and pieces + (October 29, 2012)
- Reveton += HU, LV, SK, SI, TR (!), RO - So spreading accross Europe with 6 new Design + (October 29, 2012)
- Analysis of a “/0” stealth scan from a botnet + (November 2012)
- Citadel: a cyber-criminal’s ultimate weapon? + (November 5, 2012)
- DaRK DDoSseR leads to Gh0st RAT + (November 8, 2012)
- Cool EK : "Hello my friend..." CVE-2012-5076 + (November 9, 2012)
- Meet CritXPack (Previously Vintage Pack) + (November 12, 2012)
- Probing the Gozi-Prinimalka campaign + (November 13, 2012)
- Festi botnet analysis & investigation + (November 13, 2012)
- New Xtreme RAT attacks US, Israel, and other foreign governments + (November 14, 2012)
- 1940 IPs for a BHEK/ULocker server - Nexcess-Net + (November 14, 2012)
- Malware targeting Windows 8 uses Google Docs + (November 17, 2012)
- Cool exploit kit - URL structure + (November 17, 2012)
- An analysis of Dorkbot’s infection vectors (part 2) + (November 21, 2012)
- Proactive detection of security incidents II - Honeypots + (November 22, 2012)
- Reveton can speak now ! + (November 23, 2012)
- Upas Kit (aka Rombrast) integrates webinjects + (November 24, 2012)
- Koobface botnet master KrotReal back in business, distributes ransomware and promotes BHSEO service/product + (November 26, 2012)
- Symantec/Backdoor.Arcomrat + (November 26, 2012)
- Meet ProPack Exploit Pack - yes that's a lot of pack + (November 27, 2012)
- Redkit : No more money ! Traffic US, CA, GB, AU + (November 29, 2012)
- Boxer SMS trojan: malware as a global service + (November 29, 2012)
- Inside view of Lyposit aka (for its friends) Lucky LOCKER + (November 29, 2012)
- Win32/Gataka - or should we say Zutick? + (November 30, 2012)
- DISCLOSURE: detecting botnet command and control servers through large-scale NetFlow analysis + (December 2012)
- MSRT November '12 - Weelsof around the world + (December 4, 2012)
- Unexpected reboot: Necurs + (December 6, 2012)
- Skynet, a Tor-powered botnet straight from Reddit + (December 6, 2012)
- A quick update on spambot Kelihos + (December 10, 2012)
- Carberp, the renaissance ? + (December 13, 2012)
- Carberp-in-the-Mobile + (December 14, 2012)
- Inside Impact exploit kit + (December 14, 2012)
- Getting more "personal" & deeper into Cridex with parfeit credential stealer infection + (December 15, 2012)
- Android trojan used to create simple SMS spam botnet + (December 16, 2012)
- Security alert: SpamSoldier + (December 17, 2012)
- The Pobelka botnet - a command and control case study + (December 17, 2012)
- Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems + (December 19, 2012)
- Malware attacking POS systems + (December 19, 2012)
- Malicious Apache module used for content injection: Linux/Chapro.A + (December 20, 2012)
- Exploring the market for stolen passwords + (December 26, 2012)
- Análisis del comportamiento de VOlk y sus funcionalidades + (December 26, 2012)
- ‘Dexter’ virus targets point-of-sale terminals + (December 28, 2012)
- PeerRush: mining for unwanted P2P traffic + (2013)
- Confidential documents from Japanese politics stolen by malware + (January 5, 2013)
- Under the hood of the cyber attack on U.S. banks + (January 8, 2013)
- Demystifying Pobelka + (January 11, 2013)
- The "Red October" campaign - An advanced cyber espionage network targeting diplomatic and government agencies + (January 14, 2013)
- Waledac gets cozy with Virut + (January 14, 2013)
- SPL exploit kit – now with CVE-2013-0422 + (January 14, 2013)
- Analysis of the malware of Red October - Part 1 + (January 15, 2013)
- Analysis of the malware of Red October - Part 2 + (January 15, 2013)
- Virut malware fuels Waledac botnet resurgence + (January 15, 2013)
- Hiding in plain sight: the FAKEM remote access trojan + (January 17, 2013)
- NASK shuts down dangerous Virut botnet domains + (January 18, 2013)
- Meet "Red Dot exploit toolkit" + (January 20, 2013)
- Bot herders build newer versions of previous botnet Waledac + (January 21, 2013)
- Mastermind behind Gozi bank malware charged along with two others + (January 23, 2013)
- Trojan horse using sender policy framework + (January 25, 2013)
- MDK: the largest mobile botnet in China + (January 25, 2013)
- Detecting extended attributes (ZeroAccess) and other Frankenstein’s monsters with HMFT + (January 25, 2013)
- PokerAgent botnet stealing over 16,000 Facebook credentials + (January 29, 2013)
- Got malware? Rent an exploit service + (January 29, 2013)
- Attention! All data on your hardrive is encrypted + (January 30, 2013)
- Walking through Win32/Jabberbot.A instant messaging C&C + (January 30, 2013)
- Inside the world of the Citadel trojan + (January 31, 2013)
- New crimeware attacks LatAm bank users + (February 1, 2013)
- An encounter with trojan Nap + (February 5, 2013)
- Microsoft and Symantec take down Bamital botnet that hijacks online searches + (February 6, 2013)
- Massive search fraud botnet seized by Microsoft and Symantec + (February 7, 2013)
- Trojan Nap aka Kelihos/Hlux - Feb. 2013 status update + (February 10, 2013)
- Urausy: Colorfull design refresh (+HR) & EC3 Logo + (February 10, 2013)
- Kelihos botnet appears again with new variant + (February 11, 2013)
- Malware evolving to defeat anti-DDoS services like CloudFlare? + (February 13, 2013)
- Trojan.Ransomgerpo criminal arrested + (February 14, 2013)
- Takeover of Virut domains + (February 21, 2013)
- Adobe Flash Player 0-day and HackingTeam's Remote Control System + (February 23, 2013)
- Latest Kelihos botnet shut down live at RSA Conference 2013 + (February 26, 2013)
- The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoor + (February 27, 2013)
- Miniduke + (February 27, 2013)
- Kelihos is dead… No wait… Long live Kelihos! Again! + (March 6, 2013)
- The life cycle of web server botnet recruitment + (March 6, 2013)