Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Android trojan used to create simple SMS spam botnet + (December 16, 2012)
- Security alert: SpamSoldier + (December 17, 2012)
- The Pobelka botnet - a command and control case study + (December 17, 2012)
- Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems + (December 19, 2012)
- Malware attacking POS systems + (December 19, 2012)
- Malicious Apache module used for content injection: Linux/Chapro.A + (December 20, 2012)
- Exploring the market for stolen passwords + (December 26, 2012)
- Análisis del comportamiento de VOlk y sus funcionalidades + (December 26, 2012)
- ‘Dexter’ virus targets point-of-sale terminals + (December 28, 2012)
- PeerRush: mining for unwanted P2P traffic + (2013)
- Confidential documents from Japanese politics stolen by malware + (January 5, 2013)
- Under the hood of the cyber attack on U.S. banks + (January 8, 2013)
- Demystifying Pobelka + (January 11, 2013)
- The "Red October" campaign - An advanced cyber espionage network targeting diplomatic and government agencies + (January 14, 2013)
- Waledac gets cozy with Virut + (January 14, 2013)
- SPL exploit kit – now with CVE-2013-0422 + (January 14, 2013)
- Analysis of the malware of Red October - Part 1 + (January 15, 2013)
- Analysis of the malware of Red October - Part 2 + (January 15, 2013)
- Virut malware fuels Waledac botnet resurgence + (January 15, 2013)
- Hiding in plain sight: the FAKEM remote access trojan + (January 17, 2013)
- NASK shuts down dangerous Virut botnet domains + (January 18, 2013)
- Meet "Red Dot exploit toolkit" + (January 20, 2013)
- Bot herders build newer versions of previous botnet Waledac + (January 21, 2013)
- Mastermind behind Gozi bank malware charged along with two others + (January 23, 2013)
- Trojan horse using sender policy framework + (January 25, 2013)
- MDK: the largest mobile botnet in China + (January 25, 2013)
- Detecting extended attributes (ZeroAccess) and other Frankenstein’s monsters with HMFT + (January 25, 2013)
- PokerAgent botnet stealing over 16,000 Facebook credentials + (January 29, 2013)
- Got malware? Rent an exploit service + (January 29, 2013)
- Attention! All data on your hardrive is encrypted + (January 30, 2013)
- Walking through Win32/Jabberbot.A instant messaging C&C + (January 30, 2013)
- Inside the world of the Citadel trojan + (January 31, 2013)
- New crimeware attacks LatAm bank users + (February 1, 2013)
- An encounter with trojan Nap + (February 5, 2013)
- Microsoft and Symantec take down Bamital botnet that hijacks online searches + (February 6, 2013)
- Massive search fraud botnet seized by Microsoft and Symantec + (February 7, 2013)
- Trojan Nap aka Kelihos/Hlux - Feb. 2013 status update + (February 10, 2013)
- Urausy: Colorfull design refresh (+HR) & EC3 Logo + (February 10, 2013)
- Kelihos botnet appears again with new variant + (February 11, 2013)
- Malware evolving to defeat anti-DDoS services like CloudFlare? + (February 13, 2013)
- Trojan.Ransomgerpo criminal arrested + (February 14, 2013)
- Takeover of Virut domains + (February 21, 2013)
- Adobe Flash Player 0-day and HackingTeam's Remote Control System + (February 23, 2013)
- Latest Kelihos botnet shut down live at RSA Conference 2013 + (February 26, 2013)
- The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoor + (February 27, 2013)
- Miniduke + (February 27, 2013)
- Kelihos is dead… No wait… Long live Kelihos! Again! + (March 6, 2013)
- The life cycle of web server botnet recruitment + (March 6, 2013)
- Hello Neutrino ! (just one more Exploit Kit) + (March 7, 2013)
- An overview of messaging botnets + (March 8, 2013)
- CVE-2013-1493 (jre17u15 - jre16u41) integrating exploit kits + (March 9, 2013)
- Travnet trojan could be part of APT campaign + (March 14, 2013)
- Chameleon botnet grabbed $6m A MONTH from online ad-slingers + (March 19, 2013)
- Discovered: botnet costing display advertisers over six million dollars per month + (March 19, 2013)
- Backdoor uses Evernote as command and control server + (March 27, 2013)
- Analysis of a PlugX malware variant used for targeted attacks + (March 28, 2013)
- Citadel plitfi botnet report + (April 15, 2013)
- Travnet botnet steals huge amount of sensitive data + (April 23, 2013)
- Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole + (April 26, 2013)
- Apache binary backdoors on Cpanel-based servers + (April 26, 2013)
- Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication + (May 1, 2013)
- Unveiling an Indian cyberattack infrastructure - a special report + (May 2013)
- Why forums? An empirical analysis into the facilitating factors of carding forums + (May 2, 2013)
- Lifting the lid on the Redkit exploit kit (Part 1) + (May 3, 2013)
- Department of Labor strategic web compromise + (May 3, 2013)
- Alina: casting a shadow on POS + (May 8, 2013)
- Analyse of the sample cdorked.A + (May 13, 2013)
- Targeted information stealing attacks in South Asia use email, signed binaries + (May 16, 2013)
- Mac spyware found at Oslo Freedom Forum + (May 16, 2013)
- New Mac malware discovered on attendee computer at anti-surveillance workshop + (May 17, 2013)
- Alina: following the shadow part 1 + (May 17, 2013)
- OSX Kitmos analysis + (May 20, 2013)
- Analysis of a stage 3 Miniduke malware sample + (May 30, 2013)
- ZeuS-P2P monitoring and analysis + (June 2013)
- Alina: following the shadow part 2 + (June 3, 2013)
- "NetTraveler is Running!" - Red Star APT attacks compromise high-profile victims + (June 4, 2013)
- The most sophisticated Android trojan + (June 6, 2013)
- Reversing Andromeda-Gamarue botnet + (June 7, 2013)
- Collateral damage: Microsoft hits security researchers along with Citadel + (June 7, 2013)
- Going solo: self-propagating ZBOT malware spotted + (June 10, 2013)
- "njRAT" Uncovered + (June 27, 2013)
- Look what I found: it's a Pony! + (June 30, 2013)
- The ZeroAccess botnet revealed + (July 1, 2013)
- File infector Expiro hits US, steals FTP credentials + (July 15, 2013)
- Kore exploit kit + (July 18, 2013)
- First widespread virus cross-infection + (July 23, 2013)
- The rise of TOR-based botnets + (July 24, 2013)
- Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilities + (July 24, 2013)
- ZeroAccess anti-debug uses debugger + (July 25, 2013)
- Black Dragon: "... and all will burn beneath the shadow of my wings" + (July 25, 2013)
- Five charged in largest hacking scheme ever prosecuted in US + (July 25, 2013)
- Urausy ransomware - July 2013 design refresh - "Summer 2013 collection" + (July 28, 2013)
- Versatile and infectious: Win64/Expiro is a cross-platform file infector + (July 30, 2013)
- Secrets of the Comfoo masters + (July 31, 2013)
- APT1: technical backstage + (August 4, 2013)
- CVE-2013-2465/CVE-2013-2471/CVE-2013-2463 integrating Exploit Kits -- jre7u21 CVE- jre6u45 and earlier + (August 15, 2013)
- Avatar rootkit: the continuing saga + (August 21, 2013)
- Nymaim - obfuscation chronicles + (August 26, 2013)
- NetTraveler is back: the 'Red Star' APT returns with new tricks + (September 3, 2013)
- Hesperbot – A new, advanced banking trojan in the wild + (September 5, 2013)
- Win32/64:Napolar: New trojan shines on the cyber crime-scene + (September 25, 2013)