Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoor + (Blogpost)
- Cross-platform Frutas RAT builder and back door + (Blogpost)
- Targeted information stealing attacks in South Asia use email, signed binaries + (Blogpost)
- File infector Expiro hits US, steals FTP credentials + (Blogpost)
- Internet Census 2012, port scanning /0 using insecure embedded devices + (Blogpost)
- The Epic Turla operation + (Blogpost)
- Dridex learns new trick: P2P over HTTP + (Blogpost)
- Inside Impact exploit kit + (Blogpost)
- The good , the bad and the unknown online scanners + (Blogpost)
- Got malware? Rent an exploit service + (Blogpost)
- Trojan.Ransomgerpo criminal arrested + (Blogpost)
- NetTraveler is back: the 'Red Star' APT returns with new tricks + (Blogpost)
- Latest Kelihos botnet shut down live at RSA Conference 2013 + (Blogpost)
- Alina: following the shadow part 1 + (Blogpost)
- You can’t be invulnerable, but you can be well protected + (Blogpost)
- Targeted destructive malware explained: Troj/Mdrop-ELD + (Blogpost)
- Virus scanners for virus authors + (Blogpost)
- Reversing Andromeda-Gamarue botnet + (Blogpost)
- New crypto-ransomware emerge in the wild + (Blogpost)
- Kore exploit kit + (Blogpost)
- Analysis of DarkMegi aka NpcDark + (Blogpost)
- Trojan.Whitewell: what’s your (bot) Facebook status today? + (Blogpost)
- NitlovePOS: another new POS malware + (Blogpost)
- Mac spyware found at Oslo Freedom Forum + (Blogpost)
- The life cycle of web server botnet recruitment + (Blogpost)
- PlugX malware: A good hacker is an apologetic hacker + (Blogpost)
- OSX Kitmos analysis + (Blogpost)
- Android Marcher now marching via porn sites + (Blogpost)
- Qadars: un nouveau malware bancaire avec un composant mobile + (Blogpost)
- Carbanak: Multi-million dollar cybercrime gang focuses on banks rather than their customers + (Blogpost)
- Case study of the Miner botnet + (Conference paper or presentation)
- The Waledac protocol: the how and why + (Conference paper or presentation)
- Stealing money from ATMs with malware + (Conference paper or presentation)
- An analysis of underground forums + (Conference paper or presentation)
- The evolution of webinjects + (Conference paper or presentation)
- Post-mortem of a zombie: Conficker cleanup after six years + (Conference paper or presentation)
- A Foray into Conficker’s Logic and Rendezvous Points + (Conference paper or presentation)
- Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat + (Conference paper or presentation)
- Operation Socialist The Inside Story Of How British Spies Hacked Belgium’s Largest Telco + (Press article)
- Chameleon botnet grabbed $6m A MONTH from online ad-slingers + (Press article)
- Mastermind behind Gozi bank malware charged along with two others + (Press article)
- Massive search fraud botnet seized by Microsoft and Symantec + (Press article)
- 'Tigger' trojan keeps security researchers hopping + (Press article)
- Mariposa botnet 'mastermind' jailed in Slovenia + (Press article)
- Pushdo botnet gets DGA update, over 6,000 machines host new variant + (Press article)
- Stolen passwords allowed hackers to steal over one billion rubles + (Press article)
- Five charged in largest hacking scheme ever prosecuted in US + (Press article)
- Ransomware : la sulfureuse hypothèse sur la situation chez Norsk Hydro + (Press article)
- REvil ransomware gang's web sites mysteriously shut down + (Press article)
- Bot Roast II nets 8 individuals + (Press release)
- An internet census taken by an illegal botnet – A qualitative assessment of published measurements + (Scientific paper)
- Measuring and detecting malware downloads in live network traffic + (Scientific paper)
- Survey on network-based botnet detection methods + (Scientific paper)
- The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements + (Scientific paper)
- The underground economy of spam: a botmaster's perspective of coordinating large-scale spam campaigns + (Scientific paper)
- Why forums? An empirical analysis into the facilitating factors of carding forums + (Scientific paper)
- McAfee Labs threat advisory : W32.Pinkslipbot + (Tech report)
- The IMDDOS botnet: discovery and analysis + (Tech report)
- Citadel trojan malware analysis + (Tech report)
- Hesperbot – A new, advanced banking trojan in the wild + (Tech report)
- Anunak:APT against financial institutions + (Tech report)
- FighterPOS: a new one-man PoS malware campaign + (Tech report)
- Traffic direction systems as malware distribution tools + (Tech report)
- Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware + (Tech report)
- Hammertoss: stealthy tactics define a Russian cyber threat group + (Tech report)
- Tilon/SpyEye2 intelligence report + (Tech report)
- W32.Stuxnet dossier + (Tech report)
- Kaptoxa point-of-sale compromise + (Tech report)
- Inside an APT campaign with multiple targets in India and Japan + (Tech report)
- Chasing cybercrime: network insights of Dyre and Dridex trojan bankers + (Tech report)
- Conficker working group: lessons learned + (Tech report)
- Poison Ivy: assessing damage and extracting intelligence + (Tech report)
- Symantec/Android.Ackposts + (Threat entry)
- Symantec/Backdoor.Arcomrat + (Threat entry)
- Win32/Vundo + (Threat entry)
- Symantec/Android.Maistealer + (Threat entry)
- Symantec/W32.Zorenium + (Threat entry)
- Dyre Banking Trojan + (Threat entry)
- The new era of botnets + (White paper)
- Inside the world of the Citadel trojan + (White paper)
- SDBot IRC botnet continues to make waves + (White paper)
- Hiding in plain sight: the FAKEM remote access trojan + (White paper)
- Reversing the wrath of Khan + (White paper)
- Combatting point-of-sale malware + (White paper)
- "njRAT" Uncovered + (White paper)
- Discerning relationships: the Mexican botnet connection + (White paper)
- Unveiling an Indian cyberattack infrastructure - a special report + (White paper)
- MP-DDoser:Monitoring a rapidly improving DDoS threat + (White paper)
- Kaspersky security bulletin 2015. Overall statistics for 2015 + (White paper)
- Pitou, The “silent” resurrection of the PITOU notorious Srizbi kernel spambot + (White paper)
- Dragonfly Threat Against Western Energy Suppliers + (White paper)
- PoS RAM scraper malware; past, present and future + (White paper)
- Takeover of Virut domains + (White paper)
- Demystifying Pobelka + (White paper)
- IcoScript: using webmail to control malware + (White paper)
- Analysis of a PlugX malware variant used for targeted attacks + (White paper)
- Covert channels over social networks + (White paper)
- Illuminating the Etumbot APT backdoor + (White paper)
- OSX/Flashback - The first malware to infect hundreds of thousands of Apple Mac + (White paper)
- Analysis of a stage 3 Miniduke malware sample + (White paper)