Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Ransomware ‘Holds Up’ victims +
- Ransomware: playing on your fears +
- Redkit - one account = one color +
- Redkit : No more money ! Traffic US, CA, GB, AU +
- Relentless Zbot and anti-emulations +
- Reversing malware loaders - The Matsnu-A Case +
- Reversing the wrath of Khan +
- Reveton += HU, LV, SK, SI, TR (!), RO - So spreading accross Europe with 6 new Design +
- Reveton Autumn Collection += AU,CZ, IE, NO & 17 new design +
- Reveton can speak now ! +
- Reveton.A +
- Richard Clarke on who was behind the Stuxnet attack +
- Rmnet.12 created a million Windows computer botnet +
- RootSmart Android malware +
- RootSmart malware utilizes GingerBreak root exploit +
- Rovnix Reloaded: new step of evolution +
- Rovnix bootkit framework updated +
- Rovnix.D: the code injection story +
- SIM-ple: mobile handsets are weak link in latest online banking fraud scheme +
- SIRv12 +
- SIRv12: the obstinacy of Conficker +
- SKyWIper: A complex malware for targeted attacks +
- Saudi Aramco hit by computer virus +
- Say hello to Tinba: world’s smallest trojan-banker +
- Scareware locks down computer due to child porn and terrorism +
- Security Response Android.Counterclank +
- Security alert: SpamSoldier +
- Security alert: new Android malware - TigerBot - identified in alternative markets +
- Security alert: new TGLoader Android malware utilizes the exploid root exploit +
- Security alert: new variants of Legacy Native (LeNa) identified +
- Shamoon the Wiper in details +
- Shamoon the Wiper: further details (Part II) +
- Shamoon the wiper - copycats at work +
- Shylock financial malware back 'with a vengeance' +
- Sinowal analysis (Windows 7, 32-bit) +
- Sinowal: MBR rootkit never dies! (and it always brings some new clever features) +
- Skynet, a Tor-powered botnet straight from Reddit +
- Smartcard vulnerabilities in modern banking malware +
- Sopelka Botnet: three banking trojans and one banking panel +
- Spam botnets: The fall of Grum and the rise of Festi +
- SpyEye being kicked to the curb by its customers? +
- Stamp EK (aka SofosFO) now showing "Blackhole 2.0 Like" landing pages +
- Static analysis of Dalvik bytecode and reflection in Android +
- Study of malware obfuscation techniques +
- Symantec/Android.Ackposts +
- Symantec/Android.Maistealer +
- Symantec/Backdoor.Arcomrat +
- TDI - a new element in old TDSS story +
- TDL4 reloaded: Purple Haze all in my brain +
- TDSS botnet: full disclosure +
- Tales from Crisis, Chapter 1: The dropper’s box of tricks +
- Tales from Crisis, Chapter 2: Backdoor’s first steps +
- Tales from Crisis, Chapter 3: The Italian rootkit job +
- Tales from Crisis, Chapter 4: a ghost in the network +
- Targeted destructive malware explained: Troj/Mdrop-ELD +
- Tatanga attack exposes chipTAN weaknesses +
- The ACCDFISA malware family – Ransomware targeting Windows servers +
- The ACCDFISA malware family – Ransomware targetting Windows servers +
- The Cridex trojan targets 137 financial organizations in one go +
- The Dorkbot rises +
- The Elderwood project (infographic) +
- The Flame: questions and answers +
- The Madi campaign - Part II +
- The Mirage campaign +
- The Pobelka botnet - a command and control case study +
- The ZeroAccess botnet: mining and fraud for massive financial gain +
- The ZeroAccess rootkit +
- The first trojan in history to steal Linux and Mac OS X passwords +
- The lifecycle of peer-to-peer (Gameover) ZeuS +
- The mystery of Duqu framework solved +
- The mystery of Duqu: part ten +
- The mystery of the Duqu framework +
- The where and why of Hlux +
- The ‘Madi’ infostealers - a detailed analysis +
- The “Hikit” rootkit: advanced and persistent attack techniques (part 1) +
- The “Hikit” rootkit: advanced and persistent attack techniques (part 2) +
- Tilon-son of Silon +
- Top 50 bad hosts & networks 2011 Q4 +
- Tracking down the author of the PlugX RAT +
- Trojan moves its configuration to Twitter, LinkedIn, MSDN and Baidu +
- Trojan on the loose: an in-depth analysis of police trojan +
- Trojan.Prinimalka: bits and pieces +
- Trojan.Taidoor takes aim at policy think tanks +
- Trojan.Tatanarg.B careful! +
- Trojan.ZeroAccess infection analysis +
- Unexpected reboot: Necurs +
- Unveiling the network criminal infrastructure of TDSS/TDL4 - DGAv14: a case study on a new TDSS/TDL4 variant +
- Upas Kit (aka Rombrast) integrates webinjects +
- Update to Citadel : 1.3.5.1 Rain Edition. +
- Update to Citadel : v.1.3.4.5 +
- Urausy has big plan for Europe - Targeting 3 new countries among which Norway ! +
- Urausy improving its localization - A (the\?) Gaelic Ransomware with Interpol impersonation as default landing +
- Virus Gendarmerie : variante Office Centrale de Luttre contre la criminalité – controle informationnel +
- W32.Changeup: how the worm was created +
- W32.Flamer: spreading mechanism tricks and exploits +
- W32.Shadesrat (Blackshades) author arrested +
- W32.Tinba (Tinybanker) The turkish incident +
- Weelsof use SSL C&C +
- What was that Wiper thing? +
- What’s the buzz with Bafruz +
- Who's behind the Koobface botnet? - An OSINT analysis +
- Who's behind the world's largest spam botnet? +
- Win32/Gataka - or should we say Zutick? +
- Win32/Gataka banking Trojan - Detailed analysis +
- Win32/Gataka: a banking Trojan ready to take off +
- Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems +
- Winlock affiliate +
- XPAJ: reversing a Windows x64 bootkit +
- You dirty RAT! Part 1 – DarkComet +
- You dirty RAT! part 2 – BlackShades NET +
- ZACCESS/SIREFEF arrives with new infection technique +
- ZeroAccess - new steps in evolution +
- ZeroAccess's way of self-deletion +
- ZeroAccess: code injection chronicles +
- ZeuS Gameover overview +
- ZeuS ransomware feature: win unlock +
- ZeuS v2 Malware Analysis - Part II +
- ZeuS – P2P+DGA variant – mapping out and understanding the threat +
- ZeuS: me talk pretty Finnish one day +
- ZeuSbot/Spyeye P2P updated, fortifying the botnet +
- Новый сэмпл Pandora DDoS Bot +
- ‘Dexter’ virus targets point-of-sale terminals +
- ‘Project Blitzkrieg’ promises more aggressive cyberheists against U.S. banks +