Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-04-12AkamaiStiv Kupchik
@online{kupchik:20230412:investigating:ced1ec2, author = {Stiv Kupchik}, title = {{Investigating the resurgence of the Mexals campaign}}, date = {2023-04-12}, organization = {Akamai}, url = {https://www.akamai.com/blog/security-research/mexals-cryptojacking-malware-resurgence}, language = {English}, urldate = {2023-06-19} } Investigating the resurgence of the Mexals campaign
2023-03-16AkamaiChad Seaman, Larry Cashdollar, Allen West
@online{seaman:20230316:uncovering:8712a1d, author = {Chad Seaman and Larry Cashdollar and Allen West}, title = {{Uncovering HinataBot: A Deep Dive into a Go-Based Threat}}, date = {2023-03-16}, organization = {Akamai}, url = {https://www.akamai.com/blog/security-research/hinatabot-uncovering-new-golang-ddos-botnet}, language = {English}, urldate = {2023-03-20} } Uncovering HinataBot: A Deep Dive into a Go-Based Threat
HinataBot
2022-06-15AkamaiStiv Kupchik
@online{kupchik:20220615:panchans:3b4d766, author = {Stiv Kupchik}, title = {{Panchan’s Mining Rig: New Golang Peer-to-Peer Botnet Says “Hi!”}}, date = {2022-06-15}, organization = {Akamai}, url = {https://www.akamai.com/blog/security/new-p2p-botnet-panchan}, language = {English}, urldate = {2022-07-01} } Panchan’s Mining Rig: New Golang Peer-to-Peer Botnet Says “Hi!”
2022-04-13AkamaiBen Barnea, Ophir Harpaz
@online{barnea:20220413:critical:e87961f, author = {Ben Barnea and Ophir Harpaz}, title = {{Critical Remote Code Execution Vulnerabilities in Windows RPC Runtime (CVE-2022-26809)}}, date = {2022-04-13}, organization = {Akamai}, url = {https://www.akamai.com/blog/security/critical-remote-code-execution-vulnerabilities-windows-rpc-runtime}, language = {English}, urldate = {2022-04-15} } Critical Remote Code Execution Vulnerabilities in Windows RPC Runtime (CVE-2022-26809)
2022-03-01AkamaiSecurity Intelligence Response Team
@online{team:20220301:tcp:ea95946, author = {Security Intelligence Response Team}, title = {{TCP Middlebox Reflection: Coming to a DDoS Near You}}, date = {2022-03-01}, organization = {Akamai}, url = {https://www.akamai.com/blog/security/tcp-middlebox-reflection}, language = {English}, urldate = {2022-03-02} } TCP Middlebox Reflection: Coming to a DDoS Near You
2022-02-10AkamaiBen Barnea, Shiran Guez, Ophir Harpaz
@online{barnea:20220210:fritzfrog:630a9b9, author = {Ben Barnea and Shiran Guez and Ophir Harpaz}, title = {{FritzFrog: P2P Botnet Hops Back on the Scene}}, date = {2022-02-10}, organization = {Akamai}, url = {https://www.akamai.com/blog/security/fritzfrog-p2p}, language = {English}, urldate = {2022-02-14} } FritzFrog: P2P Botnet Hops Back on the Scene
FritzFrog
2022-01-27AkamaiChad Seaman
@online{seaman:20220127:upnproxy:5a81a62, author = {Chad Seaman}, title = {{UPnProxy: Eternal Silence}}, date = {2022-01-27}, organization = {Akamai}, url = {https://www.akamai.com/blog/security/upnproxy-eternal-silence}, language = {English}, urldate = {2022-02-02} } UPnProxy: Eternal Silence
2021-09-16AkamaiLarry Cashdollar
@online{cashdollar:20210916:capoae:5ac6400, author = {Larry Cashdollar}, title = {{Capoae Malware Ramps Up: Uses Multiple Vulnerabilities and Tactics to Spread}}, date = {2021-09-16}, organization = {Akamai}, url = {https://www.akamai.com/blog/security/capoae-malware-ramps-up-uses-multiple-vulnerabilities-and-tactics-to-spread}, language = {English}, urldate = {2021-09-19} } Capoae Malware Ramps Up: Uses Multiple Vulnerabilities and Tactics to Spread
Capoae
2021-03-16AkamaiLarry Cashdollar
@online{cashdollar:20210316:another:93fb703, author = {Larry Cashdollar}, title = {{Another Golang Crypto Miner On The Loose}}, date = {2021-03-16}, organization = {Akamai}, url = {https://blogs.akamai.com/sitr/2021/03/another-golang-crypto-miner-on-the-loose.html}, language = {English}, urldate = {2021-03-22} } Another Golang Crypto Miner On The Loose
2021-01-13AkamaiYael Daihes
@online{daihes:20210113:detecting:a348691, author = {Yael Daihes}, title = {{Detecting Mylobot, unseen DGA based malware, using Deep Learning}}, date = {2021-01-13}, organization = {Akamai}, url = {https://blogs.akamai.com/sitr/2021/01/detecting-mylobot-unseen-dga-based-malware-using-deep-learning.html}, language = {English}, urldate = {2021-01-26} } Detecting Mylobot, unseen DGA based malware, using Deep Learning
MyloBot
2020-11-10AkamaiGal Meiri
@online{meiri:20201110:new:d83faa6, author = {Gal Meiri}, title = {{A new skimmer uses WebSockets and a fake credit card form to steal sensitive data}}, date = {2020-11-10}, organization = {Akamai}, url = {https://blogs.akamai.com/2020/11/a-new-skimmer-uses-websockets-and-a-fake-credit-card-form-to-steal-sensitive-data.html}, language = {English}, urldate = {2020-11-11} } A new skimmer uses WebSockets and a fake credit card form to steal sensitive data
2019-07-11AkamaiLior Lahav
@online{lahav:20190711:pykspa:9a2e7e7, author = {Lior Lahav}, title = {{Pykspa V2 DHA Updated to Become Selective}}, date = {2019-07-11}, organization = {Akamai}, url = {https://blogs.akamai.com/sitr/2019/07/pykspa-v2-dga-updated-to-become-selective.html}, language = {English}, urldate = {2020-01-06} } Pykspa V2 DHA Updated to Become Selective
Pykspa
2019-06-13AkamaiLarry Cashdollar
@online{cashdollar:20190613:latest:1dba306, author = {Larry Cashdollar}, title = {{Latest ECHOBOT: 26 Infection Vectors}}, date = {2019-06-13}, organization = {Akamai}, url = {https://blogs.akamai.com/sitr/2019/06/latest-echobot-26-infection-vectors.html}, language = {English}, urldate = {2020-01-08} } Latest ECHOBOT: 26 Infection Vectors
Echobot
2019-02-27AkamaiAsaf Nadler
@online{nadler:20190227:ramnit:e00b14d, author = {Asaf Nadler}, title = {{Ramnit in the UK}}, date = {2019-02-27}, organization = {Akamai}, url = {https://blogs.akamai.com/2019/02/ramnit-in-the-uk.html}, language = {English}, urldate = {2020-07-03} } Ramnit in the UK
Ramnit
2017-10-16AkamaiAkamei
@techreport{akamei:20171016:upnproxy:044596d, author = {Akamei}, title = {{UPnProxy: Blackhat Proxies via NAT Injections}}, date = {2017-10-16}, institution = {Akamai}, url = {https://www.akamai.com/uk/en/multimedia/documents/white-paper/upnproxy-blackhat-proxies-via-nat-injections-white-paper.pdf}, language = {English}, urldate = {2019-12-10} } UPnProxy: Blackhat Proxies via NAT Injections
Inception Framework
2016-10-01AkamaiAkamai
@techreport{akamai:20161001:kaitenstd:40de1e6, author = {Akamai}, title = {{Kaiten/STD router DDoS Malware}}, date = {2016-10-01}, institution = {Akamai}, url = {https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/kaiten-std-router-ddos-malware-threat-advisory.pdf}, language = {English}, urldate = {2020-01-08} } Kaiten/STD router DDoS Malware
Kaiten
2016-04-04AkamaiAkamai
@techreport{akamai:20160404:threat:14239df, author = {Akamai}, title = {{Threat Advisory: “BillGates” Botnet}}, date = {2016-04-04}, institution = {Akamai}, url = {https://www.akamai.com/kr/ko/multimedia/documents/state-of-the-internet/bill-gates-botnet-threat-advisory.pdf}, language = {English}, urldate = {2020-01-07} } Threat Advisory: “BillGates” Botnet
BillGates