Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Twitter + Pastebin = malware update + (August 17, 2009)
- A study of the Ilomo / Clampi botnet + (August 20, 2009)
- Google Groups trojan + (September 11, 2009)
- The Waledac protocol: the how and why + (October 13, 2009)
- Trojan.Whitewell: what’s your (bot) Facebook status today? + (October 31, 2009)
- Your botnet is my botnet: analysis of a botnet takeover + (November 9, 2009)
- Russian service online to check the detection of malware + (November 26, 2009)
- SDBot IRC botnet continues to make waves + (December 2009)
- Virus scanners for virus authors + (December 31, 2009)
- Réflexions pour un plan d'action contre les botnets + (2010)
- Overcoming reputation and proof-of-work systems in botnets + (2010)
- The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet + (2010)
- The case of TDL3 + (2010)
- On the analysis of the ZeuS botnet crimeware toolkit + (2010)
- Insights from the analysis of the Mariposa botnet + (2010)
- Cracking down on botnets + (February 24, 2010)
- Koobface, un écosystème cybercriminel ou le conte des Mille et une nuits ? + (February 24, 2010)
- Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware + (March 2010)
- Massive Drop in number of active Zeus C&C servers + (March 10, 2010)
- Virus scanners for virus authors, part II + (April 5, 2010)
- Using libemu to create malware flow graph + (April 26, 2010)
- All-in-one malware: an overview of Sality + (May 7, 2010)
- The Sality botnet + (May 14, 2010)
- Tequila botnet leads to phishing attack + (June 11, 2010)
- Conficker working group: lessons learned + (June 17, 2010)
- The anatomy of a botnet + (August 23, 2010)
- Malware pandemics + (September 1, 2010)
- Discerning relationships: the Mexican botnet connection + (September 2010)
- The IMDDOS botnet: discovery and analysis + (September 13, 2010)
- Mexican Twitter-controlled botnet unpicked + (September 15, 2010)
- Another family of DDoS bots: Avzhan + (September 22, 2010)
- Security experts detected new Twitter-controlled botnet + (September 27, 2010)
- Feodo - a new botnet on the rise + (October 21, 2010)
- Avalanche phishers migrate to ZeuS + (October 25, 2010)
- Researchers: Bredolab still lurking, though severely injured + (October 28, 2010)
- Hiloti: the (bot)master of disguise + (November 8, 2010)
- New IE Zero-Day used in targeted attacks + (November 8, 2010)
- Bleeding Life Exploit Pack + (November 23, 2010)
- VinSelf - A new backdoor in town + (November 23, 2010)
- Leouncia - Yet another backdoor + (December 14, 2010)
- Leouncia - Yet another backdoor - Part 2 + (December 14, 2010)
- Encyclopedia entry: Win32/Carberp + (2011)
- HARMUR: storing and analyzing historic data on malicious domains + (2011)
- BareBox: efficient malware analysis on bare-metal + (2011)
- Top 50 bad hosts & networks 2011 Q4 + (2011)
- Shedding light on the NeoSploit Exploit Kit + (January 4, 2011)
- Spambot evolution 2011 + (February 15, 2011)
- Tatanga: a new banking trojan with MitB functions + (February 25, 2011)
- Skunkx DDoS bot analysis + (March 14, 2011)
- Taking down botnets: Microsoft and the Rustock botnet + (March 17, 2011)
- Harnig botnet: a retreating army + (March 22, 2011)
- The evolution of TDL: conquering x64 + (March 30, 2011)
- The underground economy of spam: a botmaster's perspective of coordinating large-scale spam campaigns + (March 30, 2011)
- W32.Stuxnet dossier + (April 2011)
- Botnet operation disabled + (April 14, 2011)
- The ‘advertising’ botnet + (April 20, 2011)
- Torpig - Back to the future or how the most sophisticated trojan in 2008 reinvents itself + (June 16, 2011)
- TDL4 - Top Bot + (June 27, 2011)
- The good , the bad and the unknown online scanners + (July 2, 2011)
- HTran and the Advanced Persistent Threat + (August 3, 2011)
- Analysis of ngrBot + (August 4, 2011)
- Chapro.A source code + (August 6, 2011)
- Harnig is back + (August 9, 2011)
- GingerMaster Android Malware Utilizing A Root Exploit + (August 18, 2011)
- The Miner botnet: Bitcoin mining goes peer-to-peer + (August 19, 2011)
- Xpaj Botnet intercepts up to 87 million searches per year + (August 26, 2011)
- Morto worm sets a (DNS) record + (August 31, 2011)
- Analysis: Malware Win32/Rimecud.B + (September 5, 2011)
- Microsoft neutralizes Kelihos botnet, names defendant in case + (September 27, 2011)
- Hodprot: hot to bot + (October 5, 2011)
- VOlk-botnet takes over Latin America + (October 12, 2011)
- The mystery of Duqu: part one + (October 20, 2011)
- Get gamed and rue the day... + (23:40:00, 25 October 2011)
- Apple took 3 years to fix Finfisher trojan hole + (November 2011)
- An analysis of underground forums + (November 2, 2011)
- Esthost taken down - Biggest cybercriminal takedown in history + (November 9, 2011)
- The mystery of Duqu: part five + (November 15, 2011)
- International cyber ring that infected millions of computers dismantled + (November 19, 2011)
- Cracking into the new P2P variant of Zeusbot/Spyeye + (November 28, 2011)
- The mystery of Duqu: part six (the command and control servers) + (November 30, 2011)
- Advancing the fight against botnets with consumer notifications + (December 5, 2011)
- Evolution of Win32Carberp: going deeper + (December 5, 2011)
- Proactive detection of network security incidents + (December 7, 2011)
- Traffic direction systems as malware distribution tools + (December 12, 2011)
- Disorderly conduct: localized malware impersonates the police + (December 19, 2011)
- Malware 2 - from infection to persistence + (January 2012)
- DNS: a botnet dialect + (2012)
- SKyWIper: A complex malware for targeted attacks + (2012)
- Dorkbot: conquistando Latinoamérica + (2012)
- Malware hunting with the Sysinternals tools + (2012)
- Unveiling the network criminal infrastructure of TDSS/TDL4 - DGAv14: a case study on a new TDSS/TDL4 variant + (2012)
- Cracking the encrypted C&C protocol of the ZeroAccess botnet + (2012)
- Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat + (2012)
- Learning stateful models for network honeypots + (2012)
- ZeuS – P2P+DGA variant – mapping out and understanding the threat + (January 4, 2012)
- Ramnit goes social + (January 5, 2012)
- A peek inside the PickPocket botnet + (January 6, 2012)
- Acquisition and analysis of volatile memory from Android devices + (February 2012)
- Reveton.A + (February 1, 2012)
- TDL4 reloaded: Purple Haze all in my brain + (February 3, 2012)
- Android.Bmaster: A million-dollar mobile botnet + (February 9, 2012)
- The where and why of Hlux + (February 15, 2012)
- Cutwail drives spike in malicious HTML attachment spam + (February 16, 2012)
- Shylock financial malware back 'with a vengeance' + (February 16, 2012)
- Long life to Kelihos! + (February 17, 2012)
- Pramro and Sality - two PEs in a pod + (February 21, 2012)
- Rovnix Reloaded: new step of evolution + (February 22, 2012)
- McAfee Labs threat advisory : W32.Pinkslipbot + (February 22, 2012)
- ZeuSbot/Spyeye P2P updated, fortifying the botnet + (February 23, 2012)
- Playing cops & robbers with banks & browsers + (February 27, 2012)
- The Cridex trojan targets 137 financial organizations in one go + (March 1, 2012)
- Scareware locks down computer due to child porn and terrorism + (March 2, 2012)
- Sinowal analysis (Windows 7, 32-bit) + (March 3, 2012)
- Kelihos back in town using Fast Flux + (March 4, 2012)
- Domain generation algorithms (DGA) in stealthy malware + (March 5, 2012)
- It’s 2012 and Armageddon has arrived + (March 6, 2012)
- The mystery of the Duqu framework + (March 7, 2012)
- Reversing the wrath of Khan + (March 7, 2012)
- Emerging attack vectors - RSA slide deck + (March 7, 2012)
- A peek inside the Darkness (Optima) DDoS Bot + (March 8, 2012)
- Kelihos: not alien resurrection, more attack of the clones + (March 12, 2012)
- MSRT March 2012: breaking bad + (March 13, 2012)
- New Thor botnet nearly ready to be sold, price $8,000 + (March 14, 2012)
- Ransomware: playing on your fears + (March 16, 2012)
- TDSS botnet: full disclosure + (March 17, 2012)
- ZeuS: me talk pretty Finnish one day + (March 19, 2012)
- An interesting case of JRE sandbox breach (CVE-2012-0507) + (March 20, 2012)
- Members of the largest criminal group engaged in online banking fraud are detained + (March 20, 2012)
- Dutch users served Sinowal for lunch + (March 20, 2012)
- Covert channels over social networks + (March 20, 2012)
- Bredolab botmaster ‘Birdie’ still at large + (March 21, 2012)
- Actually, my name is Duqu - Stuxnet is my middle name + (March 23, 2012)
- Inside an APT campaign with multiple targets in India and Japan + (March 26, 2012)
- The mystery of Duqu: part ten + (March 27, 2012)
- China targets macs used by NGOs + (March 30, 2012)
- Kelihos is dead. Long live Kelihos + (March 30, 2012)
- FAQ on Kelihos.B/Hlux.B sinkholing + (April 1, 2012)
- A study on botnet detection techniques + (April 2012)
- Mac Flashback exploiting unpatched Java vulnerability + (April 2, 2012)
- Security alert: new variants of Legacy Native (LeNa) identified + (April 3, 2012)
- Doctor Web exposes 550 000 strong Mac botnet + (April 4, 2012)
- A DDoS family affair: Dirt Jumper bot family continues to evolve + (April 5, 2012)
- Flashfake Mac OS X botnet confirmed + (April 6, 2012)
- MSRT April 2012: Win32/Claretore + (April 10, 2012)
- The ACCDFISA malware family – Ransomware targeting Windows servers + (April 11, 2012)
- Malware Memory Analysis - Volatility + (April 14, 2012)
- Darkmegi: this is not the Rootkit you’re looking for + (April 16, 2012)
- DarkMegi rootkit - sample (distributed via Blackhole) + (April 18, 2012)
- Rmnet.12 created a million Windows computer botnet + (April 18, 2012)
- Panel Virus Gendarmerie : Ratio 0.36% + (April 18, 2012)
- Digging into the Nitol DDoS botnet + (April 19, 2012)
- Latest SpyEye botnet active and cheaper + (April 20, 2012)
- Analysis of DarkMegi aka NpcDark + (April 20, 2012)
- SIRv12: the obstinacy of Conficker + (April 25, 2012)
- Ransomware crimeware kits + (April 27, 2012)
- Inside Smoke Bot - botnet control panel + (April 28, 2012)
- Inside Smoke Bot - Botnet Control Panel + (April 28, 2012)
- Attackers place Command and Control servers inside enterprise walls + (April 30, 2012)
- Measuring botnet populations + (May 2, 2012)
- Police Trojan crosses the Atlantic, now targets USA and Canada + (May 9, 2012)
- Multitenancy Botnets thwart threat analysis + (May 9, 2012)
- King of spam:Festi botnet analysis + (May 11, 2012)
- Gimemo wants to play in the big league + (May 16, 2012)
- ZeuS ransomware feature: win unlock + (May 21, 2012)
- Armenian Bredolab creator jailed for computer sabotage + (May 23, 2012)
- Dirt Jumper DDoS bot increasingly popular + (May 30, 2012)
- Ransomware ‘Holds Up’ victims + (May 30, 2012)
- Analyse statique de Duqu stage 1 + (May 30, 2012)
- Say hello to Tinba: world’s smallest trojan-banker + (11:57:42, 31 May 2012)
- Trojan.Tatanarg.B careful! + (June 1, 2012)
- MP-DDoser:Monitoring a rapidly improving DDoS threat + (June 1, 2012)
- Panel Supern0va et virus gendarmerie + (June 5, 2012)
- Case study of the Miner botnet + (June 5, 2012)
- Smartcard vulnerabilities in modern banking malware + (June 6, 2012)
- Sinowal: MBR rootkit never dies! (and it always brings some new clever features) + (June 6, 2012)
- Flamer: urgent suicide + (June 6, 2012)
- Flame: replication via Windows Update MITM proxy + (June 6, 2012)
- Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-mode + (June 6, 2012)
- MP-DDoser: A rapidly improving DDoS threat + (June 7, 2012)
- Static analysis of Dalvik bytecode and reflection in Android + (June 7, 2012)
- You dirty RAT! Part 1 – DarkComet + (June 9, 2012)
- Java Zero-Days and the Blackhole Exploit Kit + (June 9, 2012)
- Back to Stuxnet: the missing link + (June 11, 2012)
- Update to Citadel : v.1.3.4.5 + (June 11, 2012)
- MSRT June '12 - cleanup on aisle one + (June 12, 2012)
- ZeroAccess's way of self-deletion + (June 13, 2012)
- A chat with NGR Bot + (June 13, 2012)
- Ransomware : Smile you're on camera - Reveton.C new landing pages + (June 14, 2012)