Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Kelihos botnet appears again with new variant + (February 11, 2013)
- Malware evolving to defeat anti-DDoS services like CloudFlare? + (February 13, 2013)
- Trojan.Ransomgerpo criminal arrested + (February 14, 2013)
- Takeover of Virut domains + (February 21, 2013)
- Adobe Flash Player 0-day and HackingTeam's Remote Control System + (February 23, 2013)
- Latest Kelihos botnet shut down live at RSA Conference 2013 + (February 26, 2013)
- The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoor + (February 27, 2013)
- Miniduke + (February 27, 2013)
- Kelihos is dead… No wait… Long live Kelihos! Again! + (March 6, 2013)
- The life cycle of web server botnet recruitment + (March 6, 2013)
- Hello Neutrino ! (just one more Exploit Kit) + (March 7, 2013)
- An overview of messaging botnets + (March 8, 2013)
- CVE-2013-1493 (jre17u15 - jre16u41) integrating exploit kits + (March 9, 2013)
- Travnet trojan could be part of APT campaign + (March 14, 2013)
- Chameleon botnet grabbed $6m A MONTH from online ad-slingers + (March 19, 2013)
- Discovered: botnet costing display advertisers over six million dollars per month + (March 19, 2013)
- Backdoor uses Evernote as command and control server + (March 27, 2013)
- Analysis of a PlugX malware variant used for targeted attacks + (March 28, 2013)
- Citadel plitfi botnet report + (April 15, 2013)
- Travnet botnet steals huge amount of sensitive data + (April 23, 2013)
- Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole + (April 26, 2013)
- Apache binary backdoors on Cpanel-based servers + (April 26, 2013)
- Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication + (May 1, 2013)
- Unveiling an Indian cyberattack infrastructure - a special report + (May 2013)
- Why forums? An empirical analysis into the facilitating factors of carding forums + (May 2, 2013)
- Lifting the lid on the Redkit exploit kit (Part 1) + (May 3, 2013)
- Department of Labor strategic web compromise + (May 3, 2013)
- Alina: casting a shadow on POS + (May 8, 2013)
- Analyse of the sample cdorked.A + (May 13, 2013)
- Targeted information stealing attacks in South Asia use email, signed binaries + (May 16, 2013)
- Mac spyware found at Oslo Freedom Forum + (May 16, 2013)
- New Mac malware discovered on attendee computer at anti-surveillance workshop + (May 17, 2013)
- Alina: following the shadow part 1 + (May 17, 2013)
- OSX Kitmos analysis + (May 20, 2013)
- Analysis of a stage 3 Miniduke malware sample + (May 30, 2013)
- ZeuS-P2P monitoring and analysis + (June 2013)
- Alina: following the shadow part 2 + (June 3, 2013)
- "NetTraveler is Running!" - Red Star APT attacks compromise high-profile victims + (June 4, 2013)
- The most sophisticated Android trojan + (June 6, 2013)
- Reversing Andromeda-Gamarue botnet + (June 7, 2013)
- Collateral damage: Microsoft hits security researchers along with Citadel + (June 7, 2013)
- Going solo: self-propagating ZBOT malware spotted + (June 10, 2013)
- "njRAT" Uncovered + (June 27, 2013)
- Look what I found: it's a Pony! + (June 30, 2013)
- The ZeroAccess botnet revealed + (July 1, 2013)
- File infector Expiro hits US, steals FTP credentials + (July 15, 2013)
- Kore exploit kit + (July 18, 2013)
- First widespread virus cross-infection + (July 23, 2013)
- The rise of TOR-based botnets + (July 24, 2013)
- Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilities + (July 24, 2013)
- ZeroAccess anti-debug uses debugger + (July 25, 2013)
- Black Dragon: "... and all will burn beneath the shadow of my wings" + (July 25, 2013)
- Five charged in largest hacking scheme ever prosecuted in US + (July 25, 2013)
- Urausy ransomware - July 2013 design refresh - "Summer 2013 collection" + (July 28, 2013)
- Versatile and infectious: Win64/Expiro is a cross-platform file infector + (July 30, 2013)
- Secrets of the Comfoo masters + (July 31, 2013)
- APT1: technical backstage + (August 4, 2013)
- CVE-2013-2465/CVE-2013-2471/CVE-2013-2463 integrating Exploit Kits -- jre7u21 CVE- jre6u45 and earlier + (August 15, 2013)
- Avatar rootkit: the continuing saga + (August 21, 2013)
- Nymaim - obfuscation chronicles + (August 26, 2013)
- NetTraveler is back: the 'Red Star' APT returns with new tricks + (September 3, 2013)
- Hesperbot – A new, advanced banking trojan in the wild + (September 5, 2013)
- Win32/64:Napolar: New trojan shines on the cyber crime-scene + (September 25, 2013)
- Qadars: un nouveau malware bancaire avec un composant mobile + (October 2, 2013)
- Win32/Vundo + (October 7, 2013)
- Worm:VBS/Jenxcus + (October 15, 2013)
- Carberp-based trojan attacking SAP + (November 20, 2013)
- Blackhole and Cool Exploit kits nearly extinct + (November 26, 2013)
- Infamous Skynet botnet author allegedly arrested + (December 5, 2013)
- Stealthy peer-to-peer C&C over SMB pipes + (December 6, 2013)
- Mariposa botnet 'mastermind' jailed in Slovenia + (December 24, 2013)
- New CryptoLocker spreads via removable drives + (December 25, 2013)
- Stealing money from ATMs with malware + (December 27, 2013)
- Trojan ChePro, the CPL storm + (December 27, 2013)
- RIG exploit kit strikes oil + (2014)
- PlugX: some uncovered points + (January 6, 2014)
- Have we seen the end of the ZeroAccess botnet? + (January 7, 2014)
- The resurrection of RedKit + (January 7, 2014)
- Kaptoxa point-of-sale compromise + (January 16, 2014)
- CVE-2013-5330 (Flash) in an unknown Exploit Kit fed by high rank websites + (February 2, 2014)
- And real name of Magnitude is.... + (February 6, 2014)
- MSIE 0-day exploit CVE-2014-0322 - Possibly targeting French aerospace association + (February 13, 2014)
- Operation SnowMan: DeputyDog actor compromises US veterans of foreign wars website + (February 13, 2014)
- Bitcrypt broken + (February 20, 2014)
- Tilon/SpyEye2 intelligence report + (February 25, 2014)
- Android RATs branch out with Dendroid + (March 5, 2014)
- CryptoDefense and How Decrypt ransomware information guide and FAQ + (March 19, 2014)
- Targeted attacks and Ukraine + (April 1, 2014)
- Win32/Sality newest component: a router’s primary DNS changer named Win32/RBrute + (April 2, 2014)
- F-Secure has discovered MiniDuke malware samples in the wild + (April 2, 2014)
- MSRT April 2014 – Ramdo + (April 8, 2014)
- Andromeda 2.7 features + (April 23, 2014)
- The Target breach by the numbers + (May 6, 2014)
- “Nemanja” botnet identified by IntelCrawler – Over a thousand point-of-sales, grocery management and accounting systems are compromised all over the world + (May 22, 2014)
- TR-24 analysis - Destory RAT family + (June 3, 2014)
- ESET analyzes first Android file-encrypting, TOR-enabled ransomware + (June 4, 2014)
- Illuminating the Etumbot APT backdoor + (June 6, 2014)
- Symantec/W32.Zorenium + (June 16, 2014)
- Zorenium bot not half the threat it claims to be + (June 17, 2014)
- Dragonfly Threat Against Western Energy Suppliers + (June 30, 2014)
- Pushdo botnet gets DGA update, over 6,000 machines host new variant + (July 16, 2014)
- Critroni crypto ransomware seen using Tor for command and control + (July 18, 2014)
- "Crypto Ransomware" CTB-Locker (Critroni.A) on the rise + (July 18, 2014)
- Lights Out: Dragonfly is on the move + (July 21, 2014)
- New crypto-ransomware emerge in the wild + (July 31, 2014)
- IcoScript: using webmail to control malware + (August 5, 2014)
- New PoS malware “Backoff” targets US + (August 6, 2014)
- A ScarePakage variant is targeting more countries : impersonating Europol and AFP + (August 6, 2014)
- Malware analysis of the Lurk downloader + (August 7, 2014)
- The Epic Turla operation + (August 7, 2014)
- ZeroLocker won't come to your rescue + (August 18, 2014)
- Kelihos botnet trying to expand by harnessing Russian national sentiments + (August 22, 2014)
- NetTraveler APT gets a makeover for 10th birthday + (August 27, 2014)
- Poison Ivy: assessing damage and extracting intelligence + (August 30, 2014)
- Vawtrak gains momentum and expands targets + (September 3, 2014)
- The evolution of webinjects + (September 24, 2014)
- Banking trojan Dridex uses macros for infection + (November 5, 2014)
- Dridex learns new trick: P2P over HTTP + (November 21, 2014)
- Sony/Destover: mystery North Korean actor’s destructive and past network activity + (December 4, 2014)
- The 'Penquin' Turla + (December 8, 2014)
- Wire Transfer Spam Spreads Upatre + (December 11, 2014)
- REVETON Ransomware Spreads with Old Tactics, New Infection Method + (December 11, 2014)
- OphionLocker: Joining in the Ransomware Race + (December 12, 2014)
- Operation Socialist The Inside Story Of How British Spies Hacked Belgium’s Largest Telco + (December 13, 2014)
- Dyre Banking Trojan + (December 17, 2014)
- Win32/Virlock: First Self-Reproducing Ransomware is also a Shape Shifter + (December 22, 2014)
- Anunak:APT against financial institutions + (December 22, 2014)
- Stolen passwords allowed hackers to steal over one billion rubles + (January 12, 2015)
- The DGA of Symmi + (January 21, 2015)
- New RATs emerge from leaked Njw0rm source code + (January 22, 2015)
- Upatre, Dyre used in Univ. of Florida attack + (January 29, 2015)
- CVE-2015-0311 (Flash up to 16.0.0.287) integrating Exploit Kits + (February 1, 2015)
- Angler Exploit Kit – Operating at the Cutting Edge + (February 5, 2015)
- Le dropper de CTB-Locker + (February 9, 2015)
- Equation: the Death Star of malware galaxy + (February 15, 2015)
- Carbanak: Multi-million dollar cybercrime gang focuses on banks rather than their customers + (February 16, 2015)
- Carbanak/Anunak in the BlueCoat malware analysis appliance + (February 18, 2015)
- TorrentLocker ransomware uses email authentication to refine spam runs + (February 27, 2015)
- LogPOS - new point of sale malware using mailslots + (March 2, 2015)
- Threat spotlight: Angler lurking in the domain shadows + (March 5, 2015)
- Ransomware report: the rise of BandarChor + (March 6, 2015)
- The Andromeda/Gamarue botnet is on the rise again + (March 16, 2015)
- NjRAT & H-Worm variant infections continue to rise + (March 20, 2015)
- NewPosThings has new PoS things + (April 1, 2015)
- FighterPOS: a new one-man PoS malware campaign + (April 10, 2015)
- Microsoft partners with Interpol, industry to disrupt global malware attack affecting more than 770,000 PCs in past six months + (April 12, 2015)
- Buh-bye Beebone! Law enforcement kills polymorphic virus-spreading botnet + (April 12, 2015)
- One-man PoS malware operation captures 22,000 credit card details in Brazil + (April 13, 2015)
- Chasing cybercrime: network insights of Dyre and Dridex trojan bankers + (April 22, 2015)
- NitlovePOS: another new POS malware + (May 23, 2015)
- Trend Micro discovers MalumPoS; malware targeting hotels and other US industries + (June 5, 2015)
- Fast look at Sundown EK + (June 8, 2015)
- Gamarue dropping Lethic bot + (June 11, 2015)
- New point-of-sale malware distributed by Andromeda botnet + (July 16, 2015)
- PoisonIvy adapts to communicate through authentication proxies + (July 23, 2015)
- Hammertoss: stealthy tactics define a Russian cyber threat group + (July 28, 2015)
- Your files are encrypted with a “Windows 10 Upgrade” + (July 31, 2015)
- Post-mortem of a zombie: Conficker cleanup after six years + (August 12, 2015)
- Watch out for CoreBot, new stealer in the wild + (August 28, 2015)
- An overnight sensation — CoreBot returns as a full-fledged financial malware + (September 10, 2015)
- AbaddonPOS: A new point of sale threat linked to Vawtrak + (November 24, 2015)
- Kaspersky security bulletin 2015. Overall statistics for 2015 + (December 15, 2015)
- Tis the season for shipping and phishing + (December 23, 2015)
- You can’t be invulnerable, but you can be well protected + (December 23, 2015)
- Social networks – A bonanza for cybercriminals + (December 29, 2015)
- Microsoft security updates January 2016 + (January 12, 2016)
- Three month FrameworkPOS malware campaign nabs ~43,000 credit cards from point of sale systems + (February 18, 2016)
- CTB-Locker is back: the web server edition + (March 1, 2016)
- First step in cross-platform Trojan bankers from Brazil done + (March 3, 2016)
- Attack on Zygote: a new twist in the evolution of mobile threats + (March 3, 2016)
- PlugX malware: A good hacker is an apologetic hacker + (March 10, 2016)
- Android Marcher now marching via porn sites + (March 10, 2016)
- Trojan downloaders on the rise: don’t let Locky or TeslaCrypt ruin your day + (March 18, 2016)
- The graphic design of "Maktub Locker" ransomware + (March 21, 2016)
- PETYA crypto-ransomware overwrites MBR to lock users out of their computers + (March 25, 2016)
- Petya ransomware skips the files and encrypts your hard drive instead + (March 25, 2016)
- TreasureHunt: a custom POS malware tool + (March 28, 2016)
- CryptXXX: new ransomware from the actors behind Reveton, dropping via Angler + (April 18, 2016)
- New crypto-ransomware JIGSAW plays nasty games + (April 19, 2016)
- MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled + (August 31, 2016)
- Source Code for IoT Botnet ‘Mirai’ Released + (October 1, 2016)
- Hackers are increasingly targeting IoT Devices with Mirai DDoS Malware + (October 19, 2016)
- Zeus variant Floki bot targets PoS data + (December 7, 2016)
- Updated Sundown Exploit Kit Uses Steganography + (December 29, 2016)
- ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar + (February 16, 2017)
- TinyNuke may be a ticking time bomb + (April 5, 2017)
- Cerber Dominates Ransomware Landscape After Locky's Demise + (April 14, 2017)
- Where Are They Today? Cybercrime Trojans That No One Misses: Shifu Malware + (August 8, 2017)
- Locky Ransomware switches to the Lukitus extension for Encrypted Files + (August 16, 2017)
- GandCrab ransomware distributed by RIG and GrandSoft exploit kits + (January 30, 2018)
- SamSam Ransomware Evolves Its Tactics Towards Targeting Whole Companies + (April 27, 2018)
- SamSam ransomware designed to inundate targeted networks with thousands of copies of itself + (April 30, 2018)
- Ransomware or Wiper? LockerGoga Straddles the Line + (March 20, 2019)
- How Lockergoga took down Hydro — ransomware used in targeted attacks aimed at big business + (March 21, 2019)
- Ransomware : la sulfureuse hypothèse sur la situation chez Norsk Hydro + (March 22, 2019)
- Dharma Ransomware Uses AV Tool to Distract from Malicious Activities + (May 8, 2019)
- REvil ransomware gang's web sites mysteriously shut down + (July 13, 2021)
- Ransomware gets professional, targeting Switzerland, Germany and Austria + (3718)