Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Lifting the lid on the Redkit exploit kit (Part 1) + (Blogpost)
- Lights Out: Dragonfly is on the move + (Blogpost)
- Locky Ransomware switches to the Lukitus extension for Encrypted Files + (Blogpost)
- LogPOS - new point of sale malware using mailslots + (Blogpost)
- Look what I found: it's a Pony! + (Blogpost)
- MDK: the largest mobile botnet in China + (Blogpost)
- MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled + (Blogpost)
- MSIE 0-day exploit CVE-2014-0322 - Possibly targeting French aerospace association + (Blogpost)
- MSRT April 2014 – Ramdo + (Blogpost)
- Mac BackDoor.Wirenet.1 config extractor + (Blogpost)
- Mac Flashback exploiting unpatched Java vulnerability + (Blogpost)
- Mac spyware found at Oslo Freedom Forum + (Blogpost)
- Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-mode + (Blogpost)
- Malicious Apache module used for content injection: Linux/Chapro.A + (Blogpost)
- Malware Uses Google Go Language + (Blogpost)
- Malware analysis of the Lurk downloader + (Blogpost)
- Malware evolving to defeat anti-DDoS services like CloudFlare? + (Blogpost)
- Massive Drop in number of active Zeus C&C servers + (Blogpost)
- Microsoft and Symantec take down Bamital botnet that hijacks online searches + (Blogpost)
- Microsoft partners with Interpol, industry to disrupt global malware attack affecting more than 770,000 PCs in past six months + (Blogpost)
- Microsoft security updates January 2016 + (Blogpost)
- Miniduke + (Blogpost)
- MoVP 1.3 Desktops, heaps, and ransomware + (Blogpost)
- Monkif botnet hides commands in JPEGs + (Blogpost)
- Morto worm sets a (DNS) record + (Blogpost)
- Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication + (Blogpost)
- NASK shuts down dangerous Virut botnet domains + (Blogpost)
- Necurs Quick Analysis + (Blogpost)
- NetTraveler APT gets a makeover for 10th birthday + (Blogpost)
- NetTraveler is back: the 'Red Star' APT returns with new tricks + (Blogpost)
- New Chinese exploit pack + (Blogpost)
- New CryptoLocker spreads via removable drives + (Blogpost)
- New GamaPoS malware piggybacks on Andromeda botnet; spreads in 13 US states + (Blogpost)
- New Mac malware discovered on attendee computer at anti-surveillance workshop + (Blogpost)
- New POS malware emerges - Punkey + (Blogpost)
- New RATs emerge from leaked Njw0rm source code + (Blogpost)
- New crimeware attacks LatAm bank users + (Blogpost)
- New crypto-ransomware JIGSAW plays nasty games + (Blogpost)
- New crypto-ransomware emerge in the wild + (Blogpost)
- New point-of-sale malware distributed by Andromeda botnet + (Blogpost)
- NewPosThings has new PoS things + (Blogpost)
- Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilities + (Blogpost)
- NitlovePOS: another new POS malware + (Blogpost)
- NjRAT & H-Worm variant infections continue to rise + (Blogpost)
- Nuevo botnet contra Mexico: Karn!v0r3x + (Blogpost)
- Nymaim - obfuscation chronicles + (Blogpost)
- OSX Kitmos analysis + (Blogpost)
- One Sinowal trojan + one gang = hundreds of thousands of compromised accountS + (Blogpost)
- One-man PoS malware operation captures 22,000 credit card details in Brazil + (Blogpost)
- OphionLocker: Joining in the Ransomware Race + (Blogpost)
- PETYA crypto-ransomware overwrites MBR to lock users out of their computers + (Blogpost)
- Petya ransomware skips the files and encrypts your hard drive instead + (Blogpost)
- PlugX malware: A good hacker is an apologetic hacker + (Blogpost)
- PlugX: some uncovered points + (Blogpost)
- PoisonIvy adapts to communicate through authentication proxies + (Blogpost)
- PokerAgent botnet stealing over 16,000 Facebook credentials + (Blogpost)
- Qadars: un nouveau malware bancaire avec un composant mobile + (Blogpost)
- REVETON Ransomware Spreads with Old Tactics, New Infection Method + (Blogpost)
- RIG exploit kit strikes oil + (Blogpost)
- Ramnit goes social + (Blogpost)
- Ransomware or Wiper? LockerGoga Straddles the Line + (Blogpost)
- Ransomware report: the rise of BandarChor + (Blogpost)
- Reversing Andromeda-Gamarue botnet + (Blogpost)
- Russian service online to check the detection of malware + (Blogpost)
- SIRv12: the obstinacy of Conficker + (Blogpost)
- SamSam Ransomware Evolves Its Tactics Towards Targeting Whole Companies + (Blogpost)
- SamSam ransomware designed to inundate targeted networks with thousands of copies of itself + (Blogpost)
- Secrets of the Comfoo masters + (Blogpost)
- Security alert: new TGLoader Android malware utilizes the exploid root exploit + (Blogpost)
- Skunkx DDoS bot analysis + (Blogpost)
- Skynet, a Tor-powered botnet straight from Reddit + (Blogpost)
- Smartcard vulnerabilities in modern banking malware + (Blogpost)
- Social networks – A bonanza for cybercriminals + (Blogpost)
- Sony/Destover: mystery North Korean actor’s destructive and past network activity + (Blogpost)
- Sopelka Botnet: three banking trojans and one banking panel + (Blogpost)
- Source Code for IoT Botnet ‘Mirai’ Released + (Blogpost)
- Spambot evolution 2011 + (Blogpost)
- Stamp EK (aka SofosFO) now showing "Blackhole 2.0 Like" landing pages + (Blogpost)
- Stealthy peer-to-peer C&C over SMB pipes + (Blogpost)
- TR-24 analysis - Destory RAT family + (Blogpost)
- Targeted attacks and Ukraine + (Blogpost)
- Targeted destructive malware explained: Troj/Mdrop-ELD + (Blogpost)
- Targeted information stealing attacks in South Asia use email, signed binaries + (Blogpost)
- Tatanga: a new banking trojan with MitB functions + (Blogpost)
- Tequila botnet leads to phishing attack + (Blogpost)
- The "Red October" campaign - An advanced cyber espionage network targeting diplomatic and government agencies + (Blogpost)
- The 'Penquin' Turla + (Blogpost)
- The ACCDFISA malware family – Ransomware targeting Windows servers + (Blogpost)
- The Andromeda/Gamarue botnet is on the rise again + (Blogpost)
- The DGA of Symmi + (Blogpost)
- The Epic Turla operation + (Blogpost)
- The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoor + (Blogpost)
- The Mirage campaign + (Blogpost)
- The Target breach by the numbers + (Blogpost)
- The ZeroAccess botnet revealed + (Blogpost)
- The good , the bad and the unknown online scanners + (Blogpost)
- The graphic design of "Maktub Locker" ransomware + (Blogpost)
- The life cycle of web server botnet recruitment + (Blogpost)
- The most sophisticated Android trojan + (Blogpost)
- The mystery of Duqu: part ten + (Blogpost)
- The resurrection of RedKit + (Blogpost)
- The rise of TOR-based botnets + (Blogpost)
- The world's biggest botnets + (Blogpost)
- Three month FrameworkPOS malware campaign nabs ~43,000 credit cards from point of sale systems + (Blogpost)
- TinyNuke may be a ticking time bomb + (Blogpost)
- Tis the season for shipping and phishing + (Blogpost)
- Torpig - Back to the future or how the most sophisticated trojan in 2008 reinvents itself + (Blogpost)
- TorrentLocker ransomware uses email authentication to refine spam runs + (Blogpost)
- Travnet botnet steals huge amount of sensitive data + (Blogpost)
- Travnet trojan could be part of APT campaign + (Blogpost)
- TreasureHunt: a custom POS malware tool + (Blogpost)
- Trend Micro discovers MalumPoS; malware targeting hotels and other US industries + (Blogpost)
- Trojan ChePro, the CPL storm + (Blogpost)
- Trojan Nap aka Kelihos/Hlux - Feb. 2013 status update + (Blogpost)
- Trojan downloaders on the rise: don’t let Locky or TeslaCrypt ruin your day + (Blogpost)
- Trojan horse using sender policy framework + (Blogpost)
- Trojan.Ransomgerpo criminal arrested + (Blogpost)
- Trojan.Tatanarg.B careful! + (Blogpost)
- Trojan.Whitewell: what’s your (bot) Facebook status today? + (Blogpost)
- Twitter + Pastebin = malware update + (Blogpost)
- Under the hood of the cyber attack on U.S. banks + (Blogpost)
- Updated Sundown Exploit Kit Uses Steganography + (Blogpost)
- Urausy ransomware - July 2013 design refresh - "Summer 2013 collection" + (Blogpost)
- Uroburos: the snake rootkit + (Blogpost)
- Vawtrak gains momentum and expands targets + (Blogpost)
- Versatile and infectious: Win64/Expiro is a cross-platform file infector + (Blogpost)
- ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar + (Blogpost)
- Virus scanners for virus authors + (Blogpost)
- Virus scanners for virus authors, part II + (Blogpost)
- Virut malware fuels Waledac botnet resurgence + (Blogpost)
- Waledac gets cozy with Virut + (Blogpost)
- Walking through Win32/Jabberbot.A instant messaging C&C + (Blogpost)
- Watch out for CoreBot, new stealer in the wild + (Blogpost)
- Where Are They Today? Cybercrime Trojans That No One Misses: Shifu Malware + (Blogpost)
- Win32/Sality newest component: a router’s primary DNS changer named Win32/RBrute + (Blogpost)
- Win32/Virlock: First Self-Reproducing Ransomware is also a Shape Shifter + (Blogpost)
- Wire Transfer Spam Spreads Upatre + (Blogpost)
- Worm:VBS/Jenxcus + (Blogpost)
- You can’t be invulnerable, but you can be well protected + (Blogpost)
- Your files are encrypted with a “Windows 10 Upgrade” + (Blogpost)
- ZeroAccess anti-debug uses debugger + (Blogpost)
- ZeuS – P2P+DGA variant – mapping out and understanding the threat + (Blogpost)
- Zeus variant Floki bot targets PoS data + (Blogpost)
- Zorenium bot not half the threat it claims to be + (Blogpost)
- “Nemanja” botnet identified by IntelCrawler – Over a thousand point-of-sales, grocery management and accounting systems are compromised all over the world + (Blogpost)