Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- 1940 IPs for a BHEK/ULocker server - Nexcess-Net +
- A DDoS family affair: Dirt Jumper bot family continues to evolve +
- A chat with NGR Bot +
- A new iteration of the TDSS/TDL-4 malware using DGA-based command and control +
- A peek inside the Darkness (Optima) DDoS Bot +
- A peek inside the PickPocket botnet +
- A quick update on spambot Kelihos +
- A study on botnet detection techniques +
- Acquisition and analysis of volatile memory from Android devices +
- Actually, my name is Duqu - Stuxnet is my middle name +
- An analysis of Dorkbot’s infection vectors (part 2) +
- An analysis of the cross-platform backdoor NetWeirdRC +
- An interesting case of JRE sandbox breach (CVE-2012-0507) +
- An overview of exploit packs +
- Analyse de Xtreme RAT +
- Analyse et poncage du botnet HerpesNet +
- Analyse statique de Duqu stage 1 +
- Analyse statique de Duqu stage 2 +
- Analysis of DarkMegi aka NpcDark +
- Analysis of TDL4 +
- Analysis of Ysreef (a variant of Tobfy) +
- Analysis of a “/0” stealth scan from a botnet +
- Analysis of functions used to encode strings in Flame (GDB script) +
- Analysis of the Finfisher lawful interception malware +
- Analyzing a new exploit pack +
- Anaru malware now live and ready to steal +
- Android malware pairs man-in-the-middle with remote-controlled banking trojan +
- Android trojan used to create simple SMS spam botnet +
- Android.Bmaster: A million-dollar mobile botnet +
- Android.Counterclank found in official Android market +
- Anonymous supporters tricked into installing ZeuS trojan +
- Análisis del comportamiento de VOlk y sus funcionalidades +
- Apple releases Java update; includes fix for vulnerability exploited by Flashback malware +
- Apple zombie malware 'NetWeird' rummages for browser and email passwords +
- Armenian Bredolab creator jailed for computer sabotage +
- Attackers place Command and Control servers inside enterprise walls +
- AutoIT ransomware +
- Back to Stuxnet: the missing link +
- Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration Panel +
- Blackhole & Cridex: season 2 episode 1: Intuit spam & SSL traffic analysis +
- Blackhole Ramnit - samples and analysis +
- Blackhole exploit kit v2 on the rise +
- Blackhole, CVE-2012-0507 and Carberp +
- Bot shopping with my wife +
- BotGrep: finding P2P bots with structured graph analysis +
- BoteAR: a “social botnet”- What are we talking about +
- Botnet command server hidden in Tor +
- Botnet shutdown success story - again: disabling the new Hlux/Kelihos botnet +
- Boxer SMS trojan: malware as a global service +
- Bredolab botmaster ‘Birdie’ still at large +
- CVE-2012-4681 - On its way to Sakura Exploit Kit too +
- CVE-2012-4681 - Redkit Exploit Kit - I want Porche Turbo +
- CVE-2012-4681 - Связка Sweet Orange +
- CVE-2012-5076 - Massively adopted - Blackhole update to 2.0.1 +
- Carberp gang evolution: CARO 2012 presentation +
- Carberp steals e-cash vouchers from Facebook users +
- Carberp, the renaissance ? +
- Carberp-in-the-Mobile +
- Carberp: it’s not over yet +
- Case study of the Miner botnet +
- China targets macs used by NGOs +
- Citadel : le fichier de configuration +
- Citadel V1.3.5.1: enter the fort’s dungeons +
- Citadel ZeuS bot +
- Citadel trojan malware analysis +
- Citadel trojan touts trouble-ticket system +
- Citadel: a cyber-criminal’s ultimate weapon? +
- Confidential documents from Japanese politics stolen by malware +
- Cool EK : "Hello my friend..." CVE-2012-5076 +
- Cool Exploit Kit - A new Browser Exploit Pack on the Battlefield with a "Duqu" like font drop +
- Cool exploit kit - URL structure +
- Covert channels over social networks +
- Cracking the encrypted C&C protocol of the ZeroAccess botnet +
- Crisis for Windows sneaks onto virtual machines +
- Crypto breakthrough shows Flame was designed by world-class scientists +
- Crypto experts called on to crack cyberspy tool's encryption +
- Cutwail drives spike in malicious HTML attachment spam +
- Cyber gang seeks botmasters to wage massive wave of trojan attacks against U.S. banks +
- DDoS attacks: the Zemra bot +
- DISCLOSURE: detecting botnet command and control servers through large-scale NetFlow analysis +
- DNS: a botnet dialect +
- DaRK DDoSseR leads to Gh0st RAT +
- DarkMegi rootkit - sample (distributed via Blackhole) +
- Darkmegi: this is not the Rootkit you’re looking for +
- De code van Dorifel nader bekeken +
- Digging inside Tinba malware - A walkthrough +
- Digging into the Nitol DDoS botnet +
- Dirt Jumper DDoS bot increasingly popular +
- Disttrack malware overwrites files, infects MBR +
- Disttrack sabotage malware wipes data at unnamed Middle East energy organization +
- Doctor Web a détecté un botnet enrôlant plus de 550 000 Mac +
- Doctor Web exposes 550 000 strong Mac botnet +
- Domain generation algorithms (DGA) in stealthy malware +
- Dorifel crypto malware paralyzes Dutch companies and public sector +
- Dorifel is much bigger than expected and it’s still active and growing! +
- Dorifel virus gereed voor Nederlandse banking phishing +
- Dorifel/Quervar: the support scammer’s secret weapon +
- Dorkbot: conquistando Latinoamérica +
- Dutch users served Sinowal for lunch +
- EURO Winlocker +