Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Alina: following the shadow part 2 + (June 3, 2013)
- "NetTraveler is Running!" - Red Star APT attacks compromise high-profile victims + (June 4, 2013)
- The most sophisticated Android trojan + (June 6, 2013)
- Reversing Andromeda-Gamarue botnet + (June 7, 2013)
- Collateral damage: Microsoft hits security researchers along with Citadel + (June 7, 2013)
- Going solo: self-propagating ZBOT malware spotted + (June 10, 2013)
- "njRAT" Uncovered + (June 27, 2013)
- Look what I found: it's a Pony! + (June 30, 2013)
- The ZeroAccess botnet revealed + (July 1, 2013)
- File infector Expiro hits US, steals FTP credentials + (July 15, 2013)
- Kore exploit kit + (July 18, 2013)
- First widespread virus cross-infection + (July 23, 2013)
- The rise of TOR-based botnets + (July 24, 2013)
- Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilities + (July 24, 2013)
- ZeroAccess anti-debug uses debugger + (July 25, 2013)
- Black Dragon: "... and all will burn beneath the shadow of my wings" + (July 25, 2013)
- Five charged in largest hacking scheme ever prosecuted in US + (July 25, 2013)
- Urausy ransomware - July 2013 design refresh - "Summer 2013 collection" + (July 28, 2013)
- Versatile and infectious: Win64/Expiro is a cross-platform file infector + (July 30, 2013)
- Secrets of the Comfoo masters + (July 31, 2013)
- APT1: technical backstage + (August 4, 2013)
- CVE-2013-2465/CVE-2013-2471/CVE-2013-2463 integrating Exploit Kits -- jre7u21 CVE- jre6u45 and earlier + (August 15, 2013)
- Avatar rootkit: the continuing saga + (August 21, 2013)
- Nymaim - obfuscation chronicles + (August 26, 2013)
- NetTraveler is back: the 'Red Star' APT returns with new tricks + (September 3, 2013)
- Hesperbot – A new, advanced banking trojan in the wild + (September 5, 2013)
- Win32/64:Napolar: New trojan shines on the cyber crime-scene + (September 25, 2013)
- Qadars: un nouveau malware bancaire avec un composant mobile + (October 2, 2013)
- Win32/Vundo + (October 7, 2013)
- Worm:VBS/Jenxcus + (October 15, 2013)
- Carberp-based trojan attacking SAP + (November 20, 2013)
- Blackhole and Cool Exploit kits nearly extinct + (November 26, 2013)
- Infamous Skynet botnet author allegedly arrested + (December 5, 2013)
- Stealthy peer-to-peer C&C over SMB pipes + (December 6, 2013)
- Mariposa botnet 'mastermind' jailed in Slovenia + (December 24, 2013)
- New CryptoLocker spreads via removable drives + (December 25, 2013)
- Stealing money from ATMs with malware + (December 27, 2013)
- Trojan ChePro, the CPL storm + (December 27, 2013)
- RIG exploit kit strikes oil + (2014)
- PlugX: some uncovered points + (January 6, 2014)
- Have we seen the end of the ZeroAccess botnet? + (January 7, 2014)
- The resurrection of RedKit + (January 7, 2014)
- Kaptoxa point-of-sale compromise + (January 16, 2014)
- CVE-2013-5330 (Flash) in an unknown Exploit Kit fed by high rank websites + (February 2, 2014)
- And real name of Magnitude is.... + (February 6, 2014)
- MSIE 0-day exploit CVE-2014-0322 - Possibly targeting French aerospace association + (February 13, 2014)
- Operation SnowMan: DeputyDog actor compromises US veterans of foreign wars website + (February 13, 2014)
- Bitcrypt broken + (February 20, 2014)
- Tilon/SpyEye2 intelligence report + (February 25, 2014)
- Android RATs branch out with Dendroid + (March 5, 2014)
- CryptoDefense and How Decrypt ransomware information guide and FAQ + (March 19, 2014)
- Targeted attacks and Ukraine + (April 1, 2014)
- Win32/Sality newest component: a router’s primary DNS changer named Win32/RBrute + (April 2, 2014)
- F-Secure has discovered MiniDuke malware samples in the wild + (April 2, 2014)
- MSRT April 2014 – Ramdo + (April 8, 2014)
- Andromeda 2.7 features + (April 23, 2014)
- The Target breach by the numbers + (May 6, 2014)
- “Nemanja” botnet identified by IntelCrawler – Over a thousand point-of-sales, grocery management and accounting systems are compromised all over the world + (May 22, 2014)
- TR-24 analysis - Destory RAT family + (June 3, 2014)
- ESET analyzes first Android file-encrypting, TOR-enabled ransomware + (June 4, 2014)
- Illuminating the Etumbot APT backdoor + (June 6, 2014)
- Symantec/W32.Zorenium + (June 16, 2014)
- Zorenium bot not half the threat it claims to be + (June 17, 2014)
- Dragonfly Threat Against Western Energy Suppliers + (June 30, 2014)
- Pushdo botnet gets DGA update, over 6,000 machines host new variant + (July 16, 2014)
- Critroni crypto ransomware seen using Tor for command and control + (July 18, 2014)
- "Crypto Ransomware" CTB-Locker (Critroni.A) on the rise + (July 18, 2014)
- Lights Out: Dragonfly is on the move + (July 21, 2014)
- New crypto-ransomware emerge in the wild + (July 31, 2014)
- IcoScript: using webmail to control malware + (August 5, 2014)
- New PoS malware “Backoff” targets US + (August 6, 2014)
- A ScarePakage variant is targeting more countries : impersonating Europol and AFP + (August 6, 2014)
- Malware analysis of the Lurk downloader + (August 7, 2014)
- The Epic Turla operation + (August 7, 2014)
- ZeroLocker won't come to your rescue + (August 18, 2014)
- Kelihos botnet trying to expand by harnessing Russian national sentiments + (August 22, 2014)
- NetTraveler APT gets a makeover for 10th birthday + (August 27, 2014)
- Poison Ivy: assessing damage and extracting intelligence + (August 30, 2014)
- Vawtrak gains momentum and expands targets + (September 3, 2014)
- The evolution of webinjects + (September 24, 2014)
- Banking trojan Dridex uses macros for infection + (November 5, 2014)
- Dridex learns new trick: P2P over HTTP + (November 21, 2014)
- Sony/Destover: mystery North Korean actor’s destructive and past network activity + (December 4, 2014)
- The 'Penquin' Turla + (December 8, 2014)
- Wire Transfer Spam Spreads Upatre + (December 11, 2014)
- REVETON Ransomware Spreads with Old Tactics, New Infection Method + (December 11, 2014)
- OphionLocker: Joining in the Ransomware Race + (December 12, 2014)
- Operation Socialist The Inside Story Of How British Spies Hacked Belgium’s Largest Telco + (December 13, 2014)
- Dyre Banking Trojan + (December 17, 2014)
- Win32/Virlock: First Self-Reproducing Ransomware is also a Shape Shifter + (December 22, 2014)
- Anunak:APT against financial institutions + (December 22, 2014)
- Stolen passwords allowed hackers to steal over one billion rubles + (January 12, 2015)
- The DGA of Symmi + (January 21, 2015)
- New RATs emerge from leaked Njw0rm source code + (January 22, 2015)
- Upatre, Dyre used in Univ. of Florida attack + (January 29, 2015)
- CVE-2015-0311 (Flash up to 16.0.0.287) integrating Exploit Kits + (February 1, 2015)
- Angler Exploit Kit – Operating at the Cutting Edge + (February 5, 2015)
- Le dropper de CTB-Locker + (February 9, 2015)
- Equation: the Death Star of malware galaxy + (February 15, 2015)
- Carbanak: Multi-million dollar cybercrime gang focuses on banks rather than their customers + (February 16, 2015)
- Carbanak/Anunak in the BlueCoat malware analysis appliance + (February 18, 2015)