Kaspersky lab

From Botnets.fr
Jump to: navigation, search

(Editor) Link to the old Wiki page : [1]

Kaspersky lab
Link

Introduction

Publications

 AuthorBotnetYear
"NetTraveler is Running!" - Red Star APT attacks compromise high-profile victimsGReATNetTraveler2013
Adobe Flash Player 0-day and HackingTeam's Remote Control SystemSergey Golovanov2013
Armenian Bredolab creator jailed for computer sabotageChristopher BrookBredolab2012
Back to Stuxnet: the missing linkAleksStuxnet
Flame
2012
BoteAR: a “social botnet”- What are we talking aboutJorge MieresBoteAR2012
Botnet shutdown success story - again: disabling the new Hlux/Kelihos botnetStefan OrtloffKelihos2012
Botnet shutdown success story: how Kaspersky Lab disabled the Hlux/Kelihos botnetTillmann WernerKelihos2011
Carberp-in-the-MobileDenis MaslennikovCarberp2012
Carberp: it’s not over yetVyacheslav ZakorzhevskyCarberp2012
Critroni crypto ransomware seen using Tor for command and controlDennis FisherCTB-Locker2014
Dorifel is much bigger than expected and it’s still active and growing!David JacobyDorifel2012
Duqu FAQRyan NaraineDuqu
Stuxnet
2011
Flame: replication via Windows Update MITM proxyAleksFlame2012
Flashfake Mac OS X botnet confirmedIgor SoumenkovFlashback2012
Full analysis of Flame's Command & Control serversGReATFlame2012
Full analysis of Flame's command & control serversGReATFlame2012
Gauss: Nation-state cyber-surveillance meets banking TrojanGReATGauss
Stuxnet
Flame
2012
Gauss: abnormal distributionGReATGauss2012
IRC bot for AndroidDenis Maslennikov2012
Kelihos/Hlux botnet returns with new techniquesMaria GarnaevaKelihos2012
Latest Kelihos botnet shut down live at RSA Conference 2013Michael MimosoKelihos2013
Latin American banks under fire from the Mexican VOlk-botnetJorge MieresVOlk2011
Madi is back - New Tricks and a new Command&Control serverNicolas BrulezMadi2012
NetTraveler APT gets a makeover for 10th birthdayCostin Raiu
Kurt Baumgartner
NetTraveler2014
NetTraveler is back: the 'Red Star' APT returns with new tricksCostin RaiuNetTraveler2013
New Mac malware discovered on attendee computer at anti-surveillance workshopBrian DonohueHangOver2013
New crimeware attacks LatAm bank usersJorge MieresPiceBOT
VOlk
S.A.P.Z.
2013
Shamoon the Wiper in detailsDmitry TarakanovShamoon2012
Shamoon the Wiper: further details (Part II)Dmitry TarakanovShamoon2012
Shamoon the wiper - copycats at workGReATShamoon
EraseMBR
2012
TDL4 - Top BotSergey Golovanov
Igor Soumenkov
TDL-42011
The "Red October" campaign - An advanced cyber espionage network targeting diplomatic and government agenciesGReATRocra2013
The Epic Turla operationGReATTurla2014
The Flame: questions and answersAlexander GostevFlame2012
The Madi campaign - Part IINicolas BrulezMadi2012
The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoorGReATMiniDuke2013
The most sophisticated Android trojanRoman UnuchekObad2013
The mystery of Duqu framework solvedIgor SoumenkovDuqu2012
The mystery of Duqu: part fiveIgor SoumenkovDuqu2011
The mystery of Duqu: part oneAlexander GostevDuqu
Stuxnet
2011
The mystery of Duqu: part six (the command and control servers)Vitaly KamlukDuqu2011
The mystery of Duqu: part tenAlexander GostevDuqu2012
The mystery of Duqu: part threeAlexander GostevDuqu2011
The mystery of Duqu: part twoAlexander GostevDuqu2011
The mystery of the Duqu frameworkIgor SoumenkovDuqu2012
The where and why of HluxSergey GolovanovGbot
Virut
Bredolab
Kelihos
2012
The ‘Madi’ infostealers - a detailed analysisNicolas BrulezMadi2012
The ‘advertising’ botnetMaria Garnaeva
Alexei Kadiev
Renos2011
What was that Wiper thing?GReATWiper2012
XPAJ: reversing a Windows x64 bootkitVyacheslav RusakovXpaj2012
... further results