Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Reveton Autumn Collection += AU,CZ, IE, NO & 17 new design + (17:00:05, 7 February 2015)
- Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration Panel + (17:00:08, 7 February 2015)
- Cool Exploit Kit - A new Browser Exploit Pack on the Battlefield with a "Duqu" like font drop + (17:00:08, 7 February 2015)
- CVE-2013-5330 (Flash) in an unknown Exploit Kit fed by high rank websites + (17:00:12, 7 February 2015)
- Reveton += HU, LV, SK, SI, TR (!), RO - So spreading accross Europe with 6 new Design + (17:00:21, 7 February 2015)
- Urausy improving its localization - A (the\?) Gaelic Ransomware with Interpol impersonation as default landing + (17:00:26, 7 February 2015)
- Update to Citadel : 1.3.5.1 Rain Edition. + (17:00:30, 7 February 2015)
- Fast look at an infection by a Blackhole Exploit Kit 2.0 + (17:00:31, 7 February 2015)
- From Sakura to Reveton via Smoke Bot - or a botnet distribution of Reveton + (17:00:34, 7 February 2015)
- Gimemo finally targeting USA with Camera Feature too + (17:00:41, 7 February 2015)
- CVE-2012-4681 - Связка Sweet Orange + (17:00:44, 7 February 2015)
- Reversing Andromeda-Gamarue botnet + (17:00:49, 7 February 2015)
- Urausy: Colorfull design refresh (+HR) & EC3 Logo + (17:00:50, 7 February 2015)
- Urausy has big plan for Europe - Targeting 3 new countries among which Norway ! + (17:00:52, 7 February 2015)
- The Madi campaign - Part II + (17:02:03, 7 February 2015)
- The mystery of Duqu: part five + (17:02:05, 7 February 2015)
- Duqu FAQ + (17:02:15, 7 February 2015)
- Carberp, the renaissance ? + (17:02:26, 7 February 2015)
- Inside Blackhole Exploits Kit v1.2.4 - Exploit Kit Control Panel + (17:02:30, 7 February 2015)
- Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control Panel + (17:02:37, 7 February 2015)
- Stamp EK (aka SofosFO) now showing "Blackhole 2.0 Like" landing pages + (17:02:40, 7 February 2015)
- Update to Citadel : v.1.3.4.5 + (17:03:02, 7 February 2015)
- CVE-2013-1493 (jre17u15 - jre16u41) integrating exploit kits + (17:03:18, 7 February 2015)
- Urausy ransomware - July 2013 design refresh - "Summer 2013 collection" + (17:03:20, 7 February 2015)
- Ransom.II - UGC payment for USA - Windows Genuine impersonation for DE + (17:03:25, 7 February 2015)
- Cool EK : "Hello my friend..." CVE-2012-5076 + (17:03:28, 7 February 2015)
- Inside view of Lyposit aka (for its friends) Lucky LOCKER + (17:03:35, 7 February 2015)
- Ransomware : Smile you're on camera - Reveton.C new landing pages + (17:03:46, 7 February 2015)
- Encyclopedia entry: Win32/Oderoor + (17:04:18, 7 February 2015)
- Botnet shutdown success story: how Kaspersky Lab disabled the Hlux/Kelihos botnet + (17:04:29, 7 February 2015)
- Inside Smoke Bot - Botnet Control Panel + (17:04:31, 7 February 2015)
- Upas Kit (aka Rombrast) integrates webinjects + (17:05:24, 7 February 2015)
- Inside Andromeda Bot v2.06 Webpanel / AKA Gamarue - Botnet Control Panel + (17:05:31, 7 February 2015)
- Encyclopedia entry: Win32/Carberp + (17:05:43, 7 February 2015)
- Inside Smoke Bot - botnet control panel + (17:06:12, 7 February 2015)
- Worm:VBS/Jenxcus + (17:06:17, 7 February 2015)
- Gimemo wants to play in the big league + (17:06:23, 7 February 2015)
- Back to Stuxnet: the missing link + (17:06:40, 7 February 2015)
- CVE-2012-4681 - On its way to Sakura Exploit Kit too + (17:06:42, 7 February 2015)
- 1940 IPs for a BHEK/ULocker server - Nexcess-Net + (17:06:44, 7 February 2015)
- The ‘Madi’ infostealers - a detailed analysis + (17:06:51, 7 February 2015)
- And real name of Magnitude is.... + (17:06:55, 7 February 2015)
- TDL4 - Top Bot + (17:07:03, 7 February 2015)
- Latin American banks under fire from the Mexican VOlk-botnet + (17:07:04, 7 February 2015)
- Backdoor:Win32/Caphaw.A + (17:07:08, 7 February 2015)
- Reveton.A + (17:07:14, 7 February 2015)
- XPAJ: reversing a Windows x64 bootkit + (17:07:28, 7 February 2015)
- Inside Citadel 1.3.4.5 C&C & Builder - Botnet Control Panel + (17:07:30, 7 February 2015)
- Reveton can speak now ! + (17:07:32, 7 February 2015)
- Angler Exploit Kit – Operating at the Cutting Edge + (21:18:49, 7 February 2015)
- Advertising + (21:50:16, 7 February 2015)
- DGA + (21:50:56, 7 February 2015)
- Property:Cc protocol + (09:49:45, 8 February 2015)
- ZeroLocker won't come to your rescue + (16:47:56, 8 February 2015)
- The ‘advertising’ botnet + (16:48:06, 8 February 2015)
- Carberp: it’s not over yet + (16:48:11, 8 February 2015)
- The mystery of the Duqu framework + (16:48:20, 8 February 2015)
- Trojan.Prinimalka: bits and pieces + (16:49:15, 8 February 2015)
- It’s not the end of the world: DarkComet misses by a mile + (16:50:06, 8 February 2015)
- A new iteration of the TDSS/TDL-4 malware using DGA-based command and control + (16:52:13, 8 February 2015)
- Le dropper de CTB-Locker + (09:57:11, 10 February 2015)
- Christophe Rieunier + (10:02:16, 10 February 2015)
- Category:Campaigns + (21:37:47, 16 February 2015)
- Equation + (21:47:44, 16 February 2015)
- Equation: the Death Star of malware galaxy + (22:08:10, 16 February 2015)
- Measuring and detecting malware downloads in live network traffic + (22:12:40, 19 February 2015)
- TorrentLocker + (22:25:35, 28 February 2015)
- TorrentLocker ransomware uses email authentication to refine spam runs + (22:26:54, 28 February 2015)
- Threat spotlight: Angler lurking in the domain shadows + (20:39:47, 8 March 2015)
- Carbanak: Multi-million dollar cybercrime gang focuses on banks rather than their customers + (20:42:56, 8 March 2015)
- NjRAT & H-Worm variant infections continue to rise + (09:59:15, 12 April 2015)
- Category:Programming languages + (10:08:03, 12 April 2015)
- Property:Programming language + (10:14:21, 12 April 2015)
- NjRAT + (10:14:50, 12 April 2015)
- .NET + (10:15:05, 12 April 2015)
- VBS + (10:17:05, 12 April 2015)
- Njw0rm + (11:03:39, 12 April 2015)
- TV5Monde + (11:06:13, 12 April 2015)
- Spamming + (14:00:29, 19 April 2015)
- Fake antivirus + (14:01:01, 19 April 2015)
- Stealing + (14:02:57, 19 April 2015)
- Harnig is back + (14:10:57, 19 April 2015)
- Atif Mushtaq + (14:14:16, 19 April 2015)
- Harnig botnet: a retreating army + (14:18:17, 19 April 2015)
- Kaiten + (14:30:08, 19 April 2015)
- NitlovePOS: another new POS malware + (11:59:27, 24 May 2015)
- Nart Villeneuve + (11:59:46, 24 May 2015)
- NitlovePOS + (12:05:06, 24 May 2015)
- LogPOS + (12:23:52, 24 May 2015)
- Spark + (12:34:55, 24 May 2015)
- Eagle + (12:35:38, 24 May 2015)
- LogPOS - new point of sale malware using mailslots + (12:37:03, 24 May 2015)
- Property:Variant of + (12:54:09, 24 May 2015)
- Punkey + (12:58:13, 24 May 2015)
- NewPosThings has new PoS things + (17:40:37, 24 May 2015)
- NewPOSThings + (17:43:11, 24 May 2015)
- One-man PoS malware operation captures 22,000 credit card details in Brazil + (22:28:10, 24 May 2015)
- Malware analysis of the Lurk downloader + (09:30:15, 7 July 2015)
- Boxer SMS trojan: malware as a global service + (17:18:35, 14 July 2015)
- Boxer + (17:19:27, 14 July 2015)
- Premium rate + (17:19:40, 14 July 2015)