2010

From Botnets.fr
Jump to: navigation, search

(Year/Month)

Description

Botnets

Publications

 AuthorEditorBotnet
All-in-one malware: an overview of SalityNicolas FalliereSymantecSality
An evaluation of current and future botnet defencesAndrew WhiteQueensland University of Technology
Another family of DDoS bots: AvzhanJeff EdwardsArbor NetworksAvzahn
Avalanche phishers migrate to ZeuSLinda McGlassonBankinfo securityZeuS
Cutwail
Battling the Zbot threatT.J. Campana
Joe Faulhaber
Paul Henry
Matt McCormack
Frank Simorjay
Holly Stewart
MicrosoftZeuS
BlackEnergy competitor – The 'Darkness' DDoS botAndré M. DiMino
Mila Parkour
Shadowserver FoundationDarkness
BlackEnergy
Bleeding Life Exploit PackDarrylKahu Security
Bredolab severely injured but not deadAtif MushtaqFireEyeBredolab
Conficker working group: lessons learnedCWGConficker working group
Cracking down on botnetsTim CrantonMicrosoftWaledac
Discerning relationships: the Mexican botnet connectionRanieri RomeraTrend MicroTequila
Mariachi
Alebrije
Mehika
Feodo - a new botnet on the riseAtif MushtaqFireEyeCridex
Insights from the analysis of the Mariposa botnetProsenjit Sinha
Amine Boukhtouta
Victor Heber Belarde
Mourad Debbabi
Mariposa
Koobface, un écosystème cybercriminel ou le conte des Mille et une nuits ?Eric FreyssinetEric FreyssinetKoobface
Leouncia - Yet another backdoorAtif MushtaqFireEyeLeouncia
Leouncia - Yet another backdoor - Part 2Atif MushtaqFireEyeLeouncia
Malware pandemicsPhilip Porras
Hassen Saidi
Vinod Yegneswaran
Office of Naval ResearchConficker
IKee.B (botnet)
Massive Drop in number of active Zeus C&C serversAbuse.chZeuS
Mexican Twitter-controlled botnet unpickedJohn LeydenThe RegisterMehika
Tequila
Mariachi
Alebrije
New IE Zero-Day used in targeted attacksVikram ThakurSymantecPirpi
On the analysis of the ZeuS botnet crimeware toolkitHamad Binsalleeh
Thomas Ormerod
Amine Boukhtouta
Prosenjit Sinha
Amr M. Youssef
Mourad Debbabi
Lingyu Wang
ZeuS
Overcoming reputation and proof-of-work systems in botnetsAndrew White
Alan Tickle
Andrew Clark
IEEEStorm
Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malwareFraser Howard
Onur Komili
Sophos
Researchers: Bredolab still lurking, though severely injuredSteve RaganBredolab
TDSS
TDL-3
Réflexions pour un plan d'action contre les botnetsEric FreyssinetSSTIC
Security experts detected new Twitter-controlled botnetInconnuSpamfighterMehika
Tequila
Mariachi
Alebrije
Step-by-step reverse engineering malware: ZeroAccess / Max++ / Smiscer crimeware rootkitGiuseppe BonfaInfosec Institute
TDL3 : The rootkit of all evilAleksandr Matrosov
Eugene Rodionov
ESETTDSS
Tequila botnet leads to phishing attackDanielle Anne VeluzTrend Micro
The IMDDOS botnet: discovery and analysisManos Antonakakis
Christopher Elisan
Aldrich de Mata
Erik Wu
DamballaIMDDOS
The Sality botnetNicolas FalliereSymantecMaazben
Storm
Rustock
Cutwail
The anatomy of a botnetASERTArbor SERTYoYo
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnetJoan Calvet
Carlton R. Davis
José M. Fernandez
Jean-Yves Marion
Pier-Luc St-Onge
Wadie Guizani
Pierre-Marc Bureau
Anil Somayaji
Annual Computer Security Applications ConferenceWaledac
The case of TDL3Ace PortuguezF-SecureTDSS
The new era of botnetsZheng Bu
Pedro Bueno
Rahul Kashyap
Adam Wosotowsky
McAfee Labs
Under the hood of Carberp: Malware & configuration analysisTrusteerCarberp
Using libemu to create malware flow graphMuhammad Najmi Ahmad Zabidi
VinSelf - A new backdoor in townAtif MushtaqFireEyeVinSelf
Virus scanners for virus authors, part IIBrian KrebsKrebs on Security