2010

From Botnets.fr
Jump to navigation Jump to search

(Year/Month)

Description

Botnets

Publications

 AuthorEditorBotnetCampaign
All-in-one malware: an overview of SalityNicolas FalliereSymantecSality
An evaluation of current and future botnet defencesAndrew WhiteQueensland University of Technology
Another family of DDoS bots: AvzhanJeff EdwardsArbor NetworksAvzahn
Avalanche phishers migrate to ZeuSLinda McGlassonBankinfo securityCutwail
ZeuS
Avalanche
Battling the Zbot threatJoe Faulhaber
Paul Henry
Frank Simorjay
Holly Stewart
T.J. Campana
Matt McCormack
MicrosoftZeuS
BlackEnergy competitor – The 'Darkness' DDoS botMila Parkour
André M. DiMino
Shadowserver FoundationBlackEnergy
Darkness
Bleeding Life Exploit PackDarrylKahu Security
Bredolab severely injured but not deadAtif MushtaqFireEyeBredolab
Conficker working group: lessons learnedCWGConficker working group
Cracking down on botnetsTim CrantonMicrosoftWaledac
Discerning relationships: the Mexican botnet connectionRanieri RomeraTrend MicroAlebrije
Tequila
Mariachi
Mehika
Feodo - a new botnet on the riseAtif MushtaqFireEyeCridex
Insights from the analysis of the Mariposa botnetAmine Boukhtouta
Prosenjit Sinha
Mourad Debbabi
Victor Heber Belarde
Mariposa
Koobface, un écosystème cybercriminel ou le conte des Mille et une nuits ?Eric FreyssinetEric FreyssinetKoobface
Leouncia - Yet another backdoorAtif MushtaqFireEyeLeouncia
Leouncia - Yet another backdoor - Part 2Atif MushtaqFireEyeLeouncia
Malware pandemicsPhilip Porras
Hassen Saidi
Vinod Yegneswaran
Office of Naval ResearchConficker
IKee.B (botnet)
Massive Drop in number of active Zeus C&C serversAbuse.chZeuS
Mexican Twitter-controlled botnet unpickedJohn LeydenThe RegisterAlebrije
Tequila
Mariachi
Mehika
New IE Zero-Day used in targeted attacksVikram ThakurSymantecPirpi
On the analysis of the ZeuS botnet crimeware toolkitHamad Binsalleeh
Thomas Ormerod
Amine Boukhtouta
Prosenjit Sinha
Amr M. Youssef
Mourad Debbabi
Lingyu Wang
ZeuS
Overcoming reputation and proof-of-work systems in botnetsAndrew White
Alan Tickle
Andrew Clark
IEEEStorm
Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malwareFraser Howard
Onur Komili
Sophos
Researchers: Bredolab still lurking, though severely injuredSteve RaganBredolab
TDL-3
TDSS
Réflexions pour un plan d'action contre les botnetsEric FreyssinetSSTIC
Security experts detected new Twitter-controlled botnetInconnuSpamfighterAlebrije
Tequila
Mariachi
Mehika
Step-by-step reverse engineering malware: ZeroAccess / Max++ / Smiscer crimeware rootkitGiuseppe BonfaInfosec Institute
TDL3 : The rootkit of all evilAleksandr Matrosov
Eugene Rodionov
ESETTDSS
Tequila botnet leads to phishing attackDanielle Anne VeluzTrend Micro
The IMDDOS botnet: discovery and analysisManos Antonakakis
Christopher Elisan
Aldrich de Mata
Erik Wu
DamballaIMDDOS
The Sality botnetNicolas FalliereSymantecCutwail
Maazben
Rustock
Storm
The anatomy of a botnetASERTArbor SERTYoYo
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnetJoan Calvet
Carlton R. Davis
José M. Fernandez
Jean-Yves Marion
Pier-Luc St-Onge
Wadie Guizani
Pierre-Marc Bureau
Anil Somayaji
Annual Computer Security Applications ConferenceWaledac
The case of TDL3Ace PortuguezF-SecureTDSS
The new era of botnetsZheng Bu
Pedro Bueno
Rahul Kashyap
Adam Wosotowsky
McAfee Labs
Under the hood of Carberp: Malware & configuration analysisTrusteerCarberp
Using libemu to create malware flow graphMuhammad Najmi Ahmad Zabidi
VinSelf - A new backdoor in townAtif MushtaqFireEyeVinSelf
Virus scanners for virus authors, part IIBrian KrebsKrebs on Security