Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- GRE flood + (Generic routing encapsulation)
- SPDY grabbing + (Grabbing of SPDY session content.)
- IoT + (Internet of Things assets (cameras, home appliances, ...))
- Spying + (Involves RATs and Rootkits)
- Logging + (Logging information is sent to the C&C)
- Mailslot + (Mailslots are an IPC mechanism allowing multiple clients to send messages to a server.)
- Memory scrapping + (Memory scrapping (for passwords, credit card data,...))
- Update + (Mise à jour du malware grâce au botnet)
- Startpage modification + (Modification of the browser's start page)
- Camera capture + (Monitor camera activity)
- Microphone capture + (Monitor microphone (sound) activity)
- Premium services + (Other premium rate services (such as pay per view videos, games...).)
- Hosts modification + (Part of the Pharming process)
- Point-of-sale + (Point-of-sale botnets: target credit card and other personal data on POS terminals.)
- MIRC + (Popular IRC software, sometimes used as basis for IRC malware construction.)
- Shared drive vector + (Propagates through shared drive / network share)
- Bitcoin payment + (Proposes a Bitcoin payment as a method to collect a ransom (or fake fine).)
- RAT + (Remote administration trojans)
- SOCKS + (SOCKS proxy)
- Pop-up + (Show a pop-up message on the victims' computers)
- Store data in ADS + (Store data in NTFS Alternate data streams)
- COVID-19 pandemic + (The 2019/2020 COVID-19 coronavirus pandemic resulted in a number of related or co-occurring attacks and malware operations)
- Server-side polymorphism + (The code that operates the mutation is on a dedicated server.)
- Cross-infection + (The malware is able to infect executables for different platforms: 64 and 32 bit, MacOS, Windows, Linux, Android...)
- POP3 password theft + (Theft of POP3 logins and passwords)
- Downloading + (These botnets are also called "loaders" and are used for pay-per-install operations.)
- Polymorphism + (Uses a polymorphic engine to mutate while keeping the original algorithm intact)
- Dynamic DNS + (Using dynamic DNS providers such as dyndns(dot)com)
- Handle generation algorithm + (Using the same principle as DGA, but this time it is the ID of the resource to access that is automatically generated, such as a twitter handle)
- WoW password theft + (World of Warcraft password theft)
- XOR encoding + (XOR encoding of data for storage and/or exfiltration)