Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- The first trojan in history to steal Linux and Mac OS X passwords + (August 22, 2012)
- Guys behind Gauss and Flame are the same + (August 23, 2012)
- Apple zombie malware 'NetWeird' rummages for browser and email passwords + (August 24, 2012)
- Tales from Crisis, Chapter 4: a ghost in the network + (August 26, 2012)
- What was that Wiper thing? + (August 29, 2012)
- Mahdi malware finds 150 new targets including U.S. and Germany, gets more evasive + (August 29, 2012)
- New Mahdi updates, new C2 server + (August 29, 2012)
- CVE-2012-4681 - On its way to Sakura Exploit Kit too + (August 29, 2012)
- Inside Ulocker + (August 30, 2012)
- CVE-2012-4681 - Redkit Exploit Kit - I want Porche Turbo + (August 30, 2012)
- CVE-2012-4681 - Связка Sweet Orange + (August 30, 2012)
- Mac BackDoor.Wirenet.1 config extractor + (August 30, 2012)
- The ZeroAccess botnet: mining and fraud for massive financial gain + (September 2012)
- Neosploit gets Java 0-Day + (September 1, 2012)
- From Sakura to Reveton via Smoke Bot - or a botnet distribution of Reveton + (September 2012)
- Virus Gendarmerie : variante Office Centrale de Luttre contre la criminalité – controle informationnel + (September 3, 2012)
- Panel Gendarmerie + (September 3, 2012)
- Weelsof use SSL C&C + (September 3, 2012)
- Karagny.L unpack + (September 4, 2012)
- Tatanga attack exposes chipTAN weaknesses + (September 4, 2012)
- PlugX: new tool for a not so new campaign + (September 10, 2012)
- Malicious Apache module injects Iframes + (September 10, 2012)
- Botnet command server hidden in Tor + (September 10, 2012)
- MSRT September '12 - Medfos, hijacking your daily search + (18:13:00, 10 September 2012)
- MoVP 1.3 Desktops, heaps, and ransomware + (September 12, 2012)
- Microsoft disrupts the emerging Nitol botnet being spread through an unsecure supply chain + (September 13, 2012)
- Fast look at an infection by a Blackhole Exploit Kit 2.0 + (September 13, 2012)
- Citadel trojan malware analysis + (September 14, 2012)
- Urausy improving its localization - A (the\?) Gaelic Ransomware with Interpol impersonation as default landing + (September 15, 2012)
- Full analysis of Flame's Command & Control servers + (September 17, 2012)
- The Mirage campaign + (September 18, 2012)
- Malware Uses Google Go Language + (September 18, 2012)
- Ransomware Casier - Sharing Design with Lyposit - Gaelic & Persian ( + (September 19, 2012)
- OSX/Flashback - The first malware to infect hundreds of thousands of Apple Mac + (September 19, 2012)
- NGRBot spreads via chat + (September 20, 2012)
- Malware discovered developed with Google's "Go" programming language + (September 22, 2012)
- Urausy has big plan for Europe - Targeting 3 new countries among which Norway ! + (September 22, 2012)
- Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration Panel + (September 23, 2012)
- Analysis of Ysreef (a variant of Tobfy) + (September 25, 2012)
- ZeuS Gameover overview + (September 25, 2012)
- Java Runtime Environment 1.7 Zero-Day Exploit Delivers Backdoor + (September 28, 2012)
- Blackhole & Cridex: season 2 episode 1: Intuit spam & SSL traffic analysis + (October 4, 2012)
- Cyber gang seeks botmasters to wage massive wave of trojan attacks against U.S. banks + (October 4, 2012)
- Update to Citadel : 1.3.5.1 Rain Edition. + (October 4, 2012)
- More details of the Dorifel servers + (October 8, 2012)
- New ransomware plays its victims an audio file, over and over and over… + (October 8, 2012)
- TDI - a new element in old TDSS story + (October 8, 2012)
- ‘Project Blitzkrieg’ promises more aggressive cyberheists against U.S. banks + (October 8, 2012)
- Cool Exploit Kit - A new Browser Exploit Pack on the Battlefield with a "Duqu" like font drop + (October 9, 2012)
- BoteAR: a “social botnet”- What are we talking about + (October 11, 2012)
- Study of malware obfuscation techniques + (October 11, 2012)
- An overview of exploit packs + (October 12, 2012)
- Reveton Autumn Collection += AU,CZ, IE, NO & 17 new design + (October 12, 2012)
- The Dorkbot rises + (October 16, 2012)
- Sopelka Botnet: three banking trojans and one banking panel + (October 17, 2012)
- Citadel V1.3.5.1: enter the fort’s dungeons + (October 18, 2012)
- Olmasco bootkit: next circle of TDL4 evolution (or not) + (October 18, 2012)
- Stamp EK (aka SofosFO) now showing "Blackhole 2.0 Like" landing pages + (October 18, 2012)
- Blackhole exploit kit v2 on the rise + (October 19, 2012)
- Analysis of TDL4 + (October 20, 2012)
- Trojan.Prinimalka: bits and pieces + (October 29, 2012)
- Reveton += HU, LV, SK, SI, TR (!), RO - So spreading accross Europe with 6 new Design + (October 29, 2012)
- Analysis of a “/0” stealth scan from a botnet + (November 2012)
- Citadel: a cyber-criminal’s ultimate weapon? + (November 5, 2012)
- DaRK DDoSseR leads to Gh0st RAT + (November 8, 2012)
- Cool EK : "Hello my friend..." CVE-2012-5076 + (November 9, 2012)
- Meet CritXPack (Previously Vintage Pack) + (November 12, 2012)
- Probing the Gozi-Prinimalka campaign + (November 13, 2012)
- Festi botnet analysis & investigation + (November 13, 2012)
- New Xtreme RAT attacks US, Israel, and other foreign governments + (November 14, 2012)
- 1940 IPs for a BHEK/ULocker server - Nexcess-Net + (November 14, 2012)
- Malware targeting Windows 8 uses Google Docs + (November 17, 2012)
- Cool exploit kit - URL structure + (November 17, 2012)
- An analysis of Dorkbot’s infection vectors (part 2) + (November 21, 2012)
- Proactive detection of security incidents II - Honeypots + (November 22, 2012)
- Reveton can speak now ! + (November 23, 2012)
- Upas Kit (aka Rombrast) integrates webinjects + (November 24, 2012)
- Koobface botnet master KrotReal back in business, distributes ransomware and promotes BHSEO service/product + (November 26, 2012)
- Symantec/Backdoor.Arcomrat + (November 26, 2012)
- Meet ProPack Exploit Pack - yes that's a lot of pack + (November 27, 2012)
- Redkit : No more money ! Traffic US, CA, GB, AU + (November 29, 2012)
- Boxer SMS trojan: malware as a global service + (November 29, 2012)
- Inside view of Lyposit aka (for its friends) Lucky LOCKER + (November 29, 2012)
- Win32/Gataka - or should we say Zutick? + (November 30, 2012)
- DISCLOSURE: detecting botnet command and control servers through large-scale NetFlow analysis + (December 2012)
- MSRT November '12 - Weelsof around the world + (December 4, 2012)
- Unexpected reboot: Necurs + (December 6, 2012)
- Skynet, a Tor-powered botnet straight from Reddit + (December 6, 2012)
- A quick update on spambot Kelihos + (December 10, 2012)
- Carberp, the renaissance ? + (December 13, 2012)
- Carberp-in-the-Mobile + (December 14, 2012)
- Inside Impact exploit kit + (December 14, 2012)
- Getting more "personal" & deeper into Cridex with parfeit credential stealer infection + (December 15, 2012)
- Android trojan used to create simple SMS spam botnet + (December 16, 2012)
- Security alert: SpamSoldier + (December 17, 2012)
- The Pobelka botnet - a command and control case study + (December 17, 2012)
- Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems + (December 19, 2012)
- Malware attacking POS systems + (December 19, 2012)
- Malicious Apache module used for content injection: Linux/Chapro.A + (December 20, 2012)
- Exploring the market for stolen passwords + (December 26, 2012)
- Análisis del comportamiento de VOlk y sus funcionalidades + (December 26, 2012)
- ‘Dexter’ virus targets point-of-sale terminals + (December 28, 2012)