Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- "Crypto Ransomware" CTB-Locker (Critroni.A) on the rise +
- "NetTraveler is Running!" - Red Star APT attacks compromise high-profile victims +
- A ScarePakage variant is targeting more countries : impersonating Europol and AFP +
- A peek inside the PickPocket botnet +
- APT1: technical backstage +
- AbaddonPOS: A new point of sale threat linked to Vawtrak +
- Adobe Flash Player 0-day and HackingTeam's Remote Control System +
- Adrenalin botnet. The trend marks the Russian crimeware +
- Advancing the fight against botnets with consumer notifications +
- Alina: casting a shadow on POS +
- Alina: following the shadow part 1 +
- Alina: following the shadow part 2 +
- An encounter with trojan Nap +
- An overnight sensation — CoreBot returns as a full-fledged financial malware +
- An overview of messaging botnets +
- Analyse et poncage du botnet HerpesNet +
- Analyse of the sample cdorked.A +
- Analysis of DarkMegi aka NpcDark +
- Analysis of a VBScript bot +
- Analysis of the malware of Red October - Part 1 +
- Analysis of the malware of Red October - Part 2 +
- Analysis: Malware Win32/Rimecud.B +
- Analyzing a new exploit pack +
- And real name of Magnitude is.... +
- Android Marcher now marching via porn sites +
- Android RATs branch out with Dendroid +
- Android trojan used to create simple SMS spam botnet +
- Andromeda 2.7 features +
- Angler Exploit Kit – Operating at the Cutting Edge +
- Another family of DDoS bots: Avzhan +
- Apache binary backdoors on Cpanel-based servers +
- Apple took 3 years to fix Finfisher trojan hole +
- Avalanche phishers migrate to ZeuS +
- Avatar rootkit: the continuing saga +
- Backdoor uses Evernote as command and control server +
- Bitcrypt broken +
- Black Dragon: "... and all will burn beneath the shadow of my wings" +
- Blackhole and Cool Exploit kits nearly extinct +
- Bot herders build newer versions of previous botnet Waledac +
- BoteAR: a “social botnet”- What are we talking about +
- Botnet command server hidden in Tor +
- Buh-bye Beebone! Law enforcement kills polymorphic virus-spreading botnet +
- CTB-Locker is back: the web server edition +
- CVE-2012-5076 - Massively adopted - Blackhole update to 2.0.1 +
- CVE-2013-2465/CVE-2013-2471/CVE-2013-2463 integrating Exploit Kits -- jre7u21 CVE- jre6u45 and earlier +
- CVE-2013-5330 (Flash) in an unknown Exploit Kit fed by high rank websites +
- CVE-2015-0311 (Flash up to 16.0.0.287) integrating Exploit Kits +
- Carbanak: Multi-million dollar cybercrime gang focuses on banks rather than their customers +
- Carberp-based trojan attacking SAP +
- Cerber Dominates Ransomware Landscape After Locky's Demise +
- Cimbot - A technical analysis +
- Collateral damage: Microsoft hits security researchers along with Citadel +
- Confidential documents from Japanese politics stolen by malware +
- Cracking down on botnets +
- Critroni crypto ransomware seen using Tor for command and control +
- Cross-platform Frutas RAT builder and back door +
- CryptXXX: new ransomware from the actors behind Reveton, dropping via Angler +
- CryptoDefense and How Decrypt ransomware information guide and FAQ +
- DarkMegi rootkit - sample (distributed via Blackhole) +
- Department of Labor strategic web compromise +
- Dharma Ransomware Uses AV Tool to Distract from Malicious Activities +
- Discovered: botnet costing display advertisers over six million dollars per month +
- Disttrack malware overwrites files, infects MBR +
- Dridex learns new trick: P2P over HTTP +
- ESET analyzes first Android file-encrypting, TOR-enabled ransomware +
- Equation: the Death Star of malware galaxy +
- F-Secure has discovered MiniDuke malware samples in the wild +
- FBI ransomware now targeting Apple’s Mac OS X users +
- Fast look at Sundown EK +
- File infector Expiro hits US, steals FTP credentials +
- First step in cross-platform Trojan bankers from Brazil done +
- First widespread virus cross-infection +
- From Sakura to Reveton via Smoke Bot - or a botnet distribution of Reveton +
- Gamarue dropping Lethic bot +
- GandCrab ransomware distributed by RIG and GrandSoft exploit kits +
- Gauss: abnormal distribution +
- Getting more "personal" & deeper into Cridex with parfeit credential stealer infection +
- Going solo: self-propagating ZBOT malware spotted +
- Google Groups trojan +
- Got malware? Rent an exploit service +
- HTran and the Advanced Persistent Threat +
- Hackers are increasingly targeting IoT Devices with Mirai DDoS Malware +
- Harnig botnet: a retreating army +
- Harnig is back +
- Have we seen the end of the ZeroAccess botnet? +
- Hello Neutrino ! (just one more Exploit Kit) +
- How Lockergoga took down Hydro — ransomware used in targeted attacks aimed at big business +
- Hébergeurs malhonnêtes : nouvelle fermeture (3FN) +
- Infamous Skynet botnet author allegedly arrested +
- Inside Impact exploit kit +
- Inside Pony 1.7 / Fareit C&C - Botnet Control Panel +
- Insights into Win32/Bradop +
- Internet Census 2012, port scanning /0 using insecure embedded devices +
- Java Runtime Environment 1.7 Zero-Day Exploit Delivers Backdoor +
- Kelihos botnet trying to expand by harnessing Russian national sentiments +
- Kelihos is dead… No wait… Long live Kelihos! Again! +
- Koobface, un écosystème cybercriminel ou le conte des Mille et une nuits ? +
- Kore exploit kit +
- Latest Kelihos botnet shut down live at RSA Conference 2013 +
- Le dropper de CTB-Locker +
- Lifting the lid on the Redkit exploit kit (Part 1) +
- Lights Out: Dragonfly is on the move +
- Locky Ransomware switches to the Lukitus extension for Encrypted Files +
- LogPOS - new point of sale malware using mailslots +
- Look what I found: it's a Pony! +
- MDK: the largest mobile botnet in China +
- MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled +
- MSIE 0-day exploit CVE-2014-0322 - Possibly targeting French aerospace association +
- MSRT April 2014 – Ramdo +
- Mac BackDoor.Wirenet.1 config extractor +
- Mac Flashback exploiting unpatched Java vulnerability +
- Mac spyware found at Oslo Freedom Forum +
- Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-mode +
- Malicious Apache module used for content injection: Linux/Chapro.A +
- Malware Uses Google Go Language +
- Malware analysis of the Lurk downloader +
- Malware evolving to defeat anti-DDoS services like CloudFlare? +
- Massive Drop in number of active Zeus C&C servers +
- Microsoft and Symantec take down Bamital botnet that hijacks online searches +
- Microsoft partners with Interpol, industry to disrupt global malware attack affecting more than 770,000 PCs in past six months +
- Microsoft security updates January 2016 +
- Miniduke +
- MoVP 1.3 Desktops, heaps, and ransomware +
- Monkif botnet hides commands in JPEGs +
- Morto worm sets a (DNS) record +
- Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication +
- NASK shuts down dangerous Virut botnet domains +
- Necurs Quick Analysis +
- NetTraveler APT gets a makeover for 10th birthday +
- NetTraveler is back: the 'Red Star' APT returns with new tricks +
- New Chinese exploit pack +
- New CryptoLocker spreads via removable drives +
- New GamaPoS malware piggybacks on Andromeda botnet; spreads in 13 US states +
- New Mac malware discovered on attendee computer at anti-surveillance workshop +
- New POS malware emerges - Punkey +
- New RATs emerge from leaked Njw0rm source code +
- New crimeware attacks LatAm bank users +
- New crypto-ransomware JIGSAW plays nasty games +
- New crypto-ransomware emerge in the wild +
- New point-of-sale malware distributed by Andromeda botnet +
- NewPosThings has new PoS things +
- Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilities +
- NitlovePOS: another new POS malware +
- NjRAT & H-Worm variant infections continue to rise +
- Nuevo botnet contra Mexico: Karn!v0r3x +
- Nymaim - obfuscation chronicles +
- OSX Kitmos analysis +
- One Sinowal trojan + one gang = hundreds of thousands of compromised accountS +
- One-man PoS malware operation captures 22,000 credit card details in Brazil +
- OphionLocker: Joining in the Ransomware Race +
- PETYA crypto-ransomware overwrites MBR to lock users out of their computers +
- Petya ransomware skips the files and encrypts your hard drive instead +
- PlugX malware: A good hacker is an apologetic hacker +
- PlugX: some uncovered points +
- PoisonIvy adapts to communicate through authentication proxies +
- PokerAgent botnet stealing over 16,000 Facebook credentials +
- Qadars: un nouveau malware bancaire avec un composant mobile +
- REVETON Ransomware Spreads with Old Tactics, New Infection Method +
- RIG exploit kit strikes oil +
- Ramnit goes social +
- Ransomware or Wiper? LockerGoga Straddles the Line +
- Ransomware report: the rise of BandarChor +
- Reversing Andromeda-Gamarue botnet +
- Russian service online to check the detection of malware +
- SIRv12: the obstinacy of Conficker +
- SamSam Ransomware Evolves Its Tactics Towards Targeting Whole Companies +
- SamSam ransomware designed to inundate targeted networks with thousands of copies of itself +
- Secrets of the Comfoo masters +
- Security alert: new TGLoader Android malware utilizes the exploid root exploit +
- Skunkx DDoS bot analysis +
- Skynet, a Tor-powered botnet straight from Reddit +
- Smartcard vulnerabilities in modern banking malware +
- Social networks – A bonanza for cybercriminals +
- Sony/Destover: mystery North Korean actor’s destructive and past network activity +
- Sopelka Botnet: three banking trojans and one banking panel +
- Source Code for IoT Botnet ‘Mirai’ Released +
- Spambot evolution 2011 +
- Stamp EK (aka SofosFO) now showing "Blackhole 2.0 Like" landing pages +
- Stealthy peer-to-peer C&C over SMB pipes +
- TR-24 analysis - Destory RAT family +
- Targeted attacks and Ukraine +
- Targeted destructive malware explained: Troj/Mdrop-ELD +
- Targeted information stealing attacks in South Asia use email, signed binaries +
- Tatanga: a new banking trojan with MitB functions +
- Tequila botnet leads to phishing attack +
- The "Red October" campaign - An advanced cyber espionage network targeting diplomatic and government agencies +
- The 'Penquin' Turla +
- The ACCDFISA malware family – Ransomware targeting Windows servers +
- The Andromeda/Gamarue botnet is on the rise again +
- The DGA of Symmi +
- The Epic Turla operation +
- The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoor +
- The Mirage campaign +
- The Target breach by the numbers +
- The ZeroAccess botnet revealed +
- The good , the bad and the unknown online scanners +
- The graphic design of "Maktub Locker" ransomware +
- The life cycle of web server botnet recruitment +
- The most sophisticated Android trojan +
- The mystery of Duqu: part ten +
- The resurrection of RedKit +
- The rise of TOR-based botnets +
- The world's biggest botnets +
- Three month FrameworkPOS malware campaign nabs ~43,000 credit cards from point of sale systems +
- TinyNuke may be a ticking time bomb +
- Tis the season for shipping and phishing +
- Torpig - Back to the future or how the most sophisticated trojan in 2008 reinvents itself +
- TorrentLocker ransomware uses email authentication to refine spam runs +
- Travnet botnet steals huge amount of sensitive data +
- Travnet trojan could be part of APT campaign +
- TreasureHunt: a custom POS malware tool +
- Trend Micro discovers MalumPoS; malware targeting hotels and other US industries +
- Trojan ChePro, the CPL storm +
- Trojan Nap aka Kelihos/Hlux - Feb. 2013 status update +
- Trojan downloaders on the rise: don’t let Locky or TeslaCrypt ruin your day +
- Trojan horse using sender policy framework +
- Trojan.Ransomgerpo criminal arrested +
- Trojan.Tatanarg.B careful! +
- Trojan.Whitewell: what’s your (bot) Facebook status today? +
- Twitter + Pastebin = malware update +
- Under the hood of the cyber attack on U.S. banks +
- Updated Sundown Exploit Kit Uses Steganography +
- Urausy ransomware - July 2013 design refresh - "Summer 2013 collection" +
- Uroburos: the snake rootkit +
- Vawtrak gains momentum and expands targets +
- Versatile and infectious: Win64/Expiro is a cross-platform file infector +
- ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar +
- Virus scanners for virus authors +
- Virus scanners for virus authors, part II +
- Virut malware fuels Waledac botnet resurgence +
- Waledac gets cozy with Virut +
- Walking through Win32/Jabberbot.A instant messaging C&C +
- Watch out for CoreBot, new stealer in the wild +
- Where Are They Today? Cybercrime Trojans That No One Misses: Shifu Malware +
- Win32/Sality newest component: a router’s primary DNS changer named Win32/RBrute +
- Win32/Virlock: First Self-Reproducing Ransomware is also a Shape Shifter +
- Wire Transfer Spam Spreads Upatre +
- Worm:VBS/Jenxcus +
- You can’t be invulnerable, but you can be well protected +
- Your files are encrypted with a “Windows 10 Upgrade” +
- ZeroAccess anti-debug uses debugger +
- ZeuS – P2P+DGA variant – mapping out and understanding the threat +
- Zeus variant Floki bot targets PoS data +
- Zorenium bot not half the threat it claims to be +
- “Nemanja” botnet identified by IntelCrawler – Over a thousand point-of-sales, grocery management and accounting systems are compromised all over the world +