Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Maktub Locker + (09:39:16, 23 March 2016)
- Coverton + (14:17:56, 27 March 2016)
- PETYA crypto-ransomware overwrites MBR to lock users out of their computers + (20:57:15, 27 March 2016)
- TrendLabs Security Intelligence Blog + (20:57:42, 27 March 2016)
- Jasen Sumalapao + (20:57:53, 27 March 2016)
- MBR overwrite + (21:08:06, 27 March 2016)
- Encrypt MFT + (21:08:35, 27 March 2016)
- Petya ransomware skips the files and encrypts your hard drive instead + (21:12:03, 27 March 2016)
- Bleeping Computer + (21:12:26, 27 March 2016)
- Lawrence Abrams + (21:12:37, 27 March 2016)
- CryptoDefense and How Decrypt ransomware information guide and FAQ + (21:14:23, 27 March 2016)
- CryptoDefense + (21:15:16, 27 March 2016)
- Petya + (21:19:29, 27 March 2016)
- TreasureHunt: a custom POS malware tool + (15:23:25, 28 March 2016)
- TreasureHunt + (15:27:16, 28 March 2016)
- FrameworkPOS + (12:32:26, 16 April 2016)
- Luis Mendieta + (12:35:56, 16 April 2016)
- Three month FrameworkPOS malware campaign nabs ~43,000 credit cards from point of sale systems + (12:37:17, 16 April 2016)
- Launch delay + (19:34:10, 19 April 2016)
- Monitor mouse events + (19:34:36, 19 April 2016)
- Check CPU name in registry + (19:34:50, 19 April 2016)
- Delphi + (19:35:58, 19 April 2016)
- Bedep + (19:41:42, 19 April 2016)
- Proofpoint + (19:42:33, 19 April 2016)
- Property:Botnetstring + (20:27:09, 19 April 2016)
- CryptXXX + (20:27:47, 19 April 2016)
- CryptXXX: new ransomware from the actors behind Reveton, dropping via Angler + (20:34:35, 19 April 2016)
- CryptProjectXXX + (20:37:23, 19 April 2016)
- Category:Strings + (20:37:57, 19 April 2016)
- Erase files + (07:50:28, 1 May 2016)
- Jigsaw + (08:00:35, 1 May 2016)
- New crypto-ransomware JIGSAW plays nasty games + (08:03:02, 1 May 2016)
- AbaddonPOS + (13:48:07, 14 May 2016)
- AbaddonPOS: A new point of sale threat linked to Vawtrak + (13:52:43, 14 May 2016)
- Darien Huss + (13:53:18, 14 May 2016)
- Coinbitclip + (12:22:36, 28 June 2016)
- Source Code for IoT Botnet ‘Mirai’ Released + (17:45:52, 22 October 2016)
- Bashlight + (17:46:49, 22 October 2016)
- IoT + (17:52:42, 22 October 2016)
- GRE flood + (17:54:43, 22 October 2016)
- Anna-senpai + (18:02:18, 22 October 2016)
- Category:Person + (18:02:55, 22 October 2016)
- Krebs on Security + (18:04:02, 22 October 2016)
- MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled + (18:08:48, 22 October 2016)
- Hackers are increasingly targeting IoT Devices with Mirai DDoS Malware + (09:58:15, 30 October 2016)
- XiongMai Technologies + (09:59:27, 30 October 2016)
- C + (10:00:57, 30 October 2016)
- Go + (10:01:12, 30 October 2016)
- AVTECH + (10:01:54, 30 October 2016)
- Dahua Technology + (10:02:54, 30 October 2016)
- HackRead + (10:03:36, 30 October 2016)
- Waqas Amir + (10:05:13, 30 October 2016)
- Mirai + (10:09:51, 30 October 2016)
- Motorola 68000 + (10:12:14, 30 October 2016)
- Category:CPU + (10:12:34, 30 October 2016)
- Trustwave + (10:14:29, 30 October 2016)
- Landings DE + (10:19:13, 30 October 2016)
- File:Flag of Germany.svg + (10:35:05, 30 October 2016)
- File:Flag of France.svg + (10:41:07, 30 October 2016)
- File:Flag placeholder.svg + (10:49:21, 30 October 2016)
- Updated Sundown Exploit Kit Uses Steganography + (13:27:58, 1 January 2017)
- Zeus variant Floki bot targets PoS data + (21:48:46, 3 January 2017)
- Floki + (21:51:19, 3 January 2017)
- Point-of-sale terminals + (21:52:47, 3 January 2017)
- GootKit + (15:54:59, 26 January 2017)
- Sage + (21:12:15, 3 February 2017)
- ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar + (13:55:00, 18 February 2017)
- ViperRAT + (13:57:13, 18 February 2017)
- Michael Flossman + (13:57:24, 18 February 2017)
- Israeli Defence Force + (13:58:04, 18 February 2017)
- Cerber Dominates Ransomware Landscape After Locky's Demise + (09:36:22, 16 April 2017)
- Catalin Cimpanu + (09:36:52, 16 April 2017)
- As-a-service + (09:39:00, 16 April 2017)
- Cerber + (09:40:10, 16 April 2017)
- .cerber + (09:40:31, 16 April 2017)
- Category:File extension + (09:41:47, 16 April 2017)
- Japan + (07:10:15, 9 August 2017)
- Shifu + (07:11:30, 9 August 2017)
- Where Are They Today? Cybercrime Trojans That No One Misses: Shifu Malware + (07:14:12, 9 August 2017)
- Lukitus + (16:24:03, 23 August 2017)
- .lukitus + (16:24:27, 23 August 2017)
- Locky Ransomware switches to the Lukitus extension for Encrypted Files + (16:27:38, 23 August 2017)
- CVE-2017-5715 + (22:38:49, 3 January 2018)
- Intel CPUs + (22:39:28, 3 January 2018)
- APT15 + (14:05:19, 10 March 2018)
- TinyNuke + (14:43:02, 17 April 2018)
- TinyNuke may be a ticking time bomb + (18:52:08, 17 April 2018)
- SamSam Ransomware Evolves Its Tactics Towards Targeting Whole Companies + (15:36:11, 1 May 2018)
- SamSam + (15:36:33, 1 May 2018)
- Tara Seals + (15:37:13, 1 May 2018)
- 2018 + (15:39:52, 1 May 2018)
- Threatpost + (15:40:22, 1 May 2018)
- Dennis Fisher + (15:40:33, 1 May 2018)
- SamSam ransomware designed to inundate targeted networks with thousands of copies of itself + (15:44:28, 1 May 2018)
- SC Magazine + (15:44:53, 1 May 2018)
- Bradley Barth + (15:45:03, 1 May 2018)
- TCP/2541 + (15:17:57, 17 July 2018)
- Revenge RAT + (15:23:20, 17 July 2018)
- GandCrab + (12:59:16, 18 July 2018)
- GandCrab ransomware distributed by RIG and GrandSoft exploit kits + (13:03:42, 18 July 2018)
- Malwarebytes + (13:04:07, 18 July 2018)
- Jérôme Segura + (13:04:39, 18 July 2018)
- Vasilios Hioueras + (13:04:56, 18 July 2018)
- Ransomware or Wiper? LockerGoga Straddles the Line + (09:10:09, 23 March 2019)
- Ransomware : la sulfureuse hypothèse sur la situation chez Norsk Hydro + (09:17:09, 23 March 2019)
- Norsk Hydro + (09:17:57, 23 March 2019)
- Nick Biasini + (09:18:10, 23 March 2019)
- 2019 + (09:28:12, 23 March 2019)
- Altran + (09:28:47, 23 March 2019)
- How Lockergoga took down Hydro — ransomware used in targeted attacks aimed at big business + (09:33:45, 23 March 2019)
- LockerGoga + (09:47:48, 23 March 2019)
- Disable network adapters + (09:50:19, 23 March 2019)
- Dharma + (14:10:44, 12 May 2019)
- Dharma Ransomware Uses AV Tool to Distract from Malicious Activities + (14:13:51, 12 May 2019)
- smw/schema:Group:Schema properties + (11:32:19, 20 October 2019)
- Property:Foaf:knows + (11:34:28, 20 October 2019)
- Property:Foaf:name + (11:34:32, 20 October 2019)
- Property:Foaf:homepage + (11:34:33, 20 October 2019)
- Property:Owl:differentFrom + (11:34:34, 20 October 2019)
- .CryptoHasYou. + (20:36:25, 3 March 2020)
- .enc + (20:36:48, 3 March 2020)
- Main Page + (10:17:33, 14 March 2020)
- Property:Type of asset + (10:30:04, 14 March 2020)
- COVID-19 pandemic + (10:35:35, 14 March 2020)
- Live Coronavirus Map Used to Spread Malware + (10:54:24, 14 March 2020)
- Netwalker + (10:45:36, 11 July 2021)
- Ryuk + (11:27:13, 11 July 2021)
- Ragnar Locker + (11:28:25, 11 July 2021)
- REvil + (11:29:07, 11 July 2021)
- Egregor + (11:30:20, 11 July 2021)
- Bitpaymer + (11:30:45, 11 July 2021)
- DarkSide + (11:31:26, 11 July 2021)
- WannaCry + (11:33:11, 11 July 2021)
- Qlocker + (11:33:27, 11 July 2021)
- smw/schema:Group:Predefined properties + (12:33:03, 14 July 2021)
- Bac à sable + (20:40:01, 14 July 2021)
- REvil ransomware gang's web sites mysteriously shut down + (20:52:53, 14 July 2021)
- 2021 + (20:53:19, 14 July 2021)
- LockBit + (05:04:26, 15 July 2021)