Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-05-24CERT.PLPaweł Srokosz
@online{srokosz:20170524:analysis:1d591e7, author = {Paweł Srokosz}, title = {{Analysis of Emotet v4}}, date = {2017-05-24}, organization = {CERT.PL}, url = {https://www.cert.pl/en/news/single/analysis-of-emotet-v4/}, language = {English}, urldate = {2020-01-09} } Analysis of Emotet v4
Emotet
2017-02-14CERT.PLJarosław Jedynak
@online{jedynak:20170214:sage:c9187b1, author = {Jarosław Jedynak}, title = {{Sage 2.0 analysis}}, date = {2017-02-14}, organization = {CERT.PL}, url = {https://www.cert.pl/en/news/single/sage-2-0-analysis/}, language = {English}, urldate = {2020-01-13} } Sage 2.0 analysis
SAGE
2017-01-30CERT.PLJarosław Jedynak
@online{jedynak:20170130:nymaim:d5553e6, author = {Jarosław Jedynak}, title = {{Nymaim revisited}}, date = {2017-01-30}, organization = {CERT.PL}, url = {https://www.cert.pl/en/news/single/nymaim-revisited/}, language = {English}, urldate = {2020-01-09} } Nymaim revisited
Nymaim
2017-01-04CERT.PLJarosław Jedynak
@online{jedynak:20170104:technical:9cf0ab7, author = {Jarosław Jedynak}, title = {{Technical analysis of CryptoMix/CryptFile2 ransomware}}, date = {2017-01-04}, organization = {CERT.PL}, url = {https://www.cert.pl/en/news/single/technical-analysis-of-cryptomixcryptfile2-ransomware/}, language = {English}, urldate = {2020-01-13} } Technical analysis of CryptoMix/CryptFile2 ransomware
CryptoMix
2016-09-16CERT.PLAdam Krasuski
@online{krasuski:20160916:tofsee:79a1d35, author = {Adam Krasuski}, title = {{Tofsee – modular spambot}}, date = {2016-09-16}, organization = {CERT.PL}, url = {https://www.cert.pl/en/news/single/tofsee-en/}, language = {English}, urldate = {2020-01-13} } Tofsee – modular spambot
Tofsee
2016-09-02CERT.PLAdam Krasuski
@online{krasuski:20160902:necurs:d01f298, author = {Adam Krasuski}, title = {{Necurs – hybrid spam botnet}}, date = {2016-09-02}, organization = {CERT.PL}, url = {https://www.cert.pl/en/news/single/necurs-hybrid-spam-botnet/}, language = {English}, urldate = {2019-11-20} } Necurs – hybrid spam botnet
Necurs
2016-08-10CERT.PLKamil Frankowicz
@online{frankowicz:20160810:cryptxxx:1ee108b, author = {Kamil Frankowicz}, title = {{CryptXXX \ CrypMIC – intensywnie dystrybuowany ransomware w ramach exploit-kitów}}, date = {2016-08-10}, organization = {CERT.PL}, url = {https://www.cert.pl/news/single/cryptxxx-crypmic-ransomware-dystrybuowany-ramach-exploit-kitow/}, language = {Polish}, urldate = {2019-10-14} } CryptXXX \ CrypMIC – intensywnie dystrybuowany ransomware w ramach exploit-kitów
CrypMic CryptXXXX
2016-05-17CERT.PLmak
@online{mak:20160517:newest:d00afc9, author = {mak}, title = {{Newest addition to a happy family: KBOT}}, date = {2016-05-17}, organization = {CERT.PL}, url = {http://www.cert.pl/news/11379}, language = {English}, urldate = {2020-02-18} } Newest addition to a happy family: KBOT
Bolek
2016-05-12CERT.PLKamil Frankowicz
@online{frankowicz:20160512:latentbot:9506f35, author = {Kamil Frankowicz}, title = {{LatentBot – modularny i silnie zaciemniony bot}}, date = {2016-05-12}, organization = {CERT.PL}, url = {https://www.cert.pl/news/single/latentbot-modularny-i-silnie-zaciemniony-bot/}, language = {Polish}, urldate = {2019-12-18} } LatentBot – modularny i silnie zaciemniony bot
LatentBot
2015-12CERT.PLCERT.PL
@techreport{certpl:201512:zeusp2p:47dc4ed, author = {CERT.PL}, title = {{ZeuS-P2P monitoring and analysis}}, date = {2015-12}, institution = {CERT.PL}, url = {https://www.cert.pl/wp-content/uploads/2015/12/2013-06-p2p-rap_en.pdf}, language = {English}, urldate = {2020-01-13} } ZeuS-P2P monitoring and analysis
Gameover P2P
2015-11-10CERT.PLCERT.PL
@online{certpl:20151110:talking:d93cf24, author = {CERT.PL}, title = {{Talking to Dridex (part 0) – inside the dropper}}, date = {2015-11-10}, organization = {CERT.PL}, url = {https://www.cert.pl/en/news/single/talking-dridex-part-0-inside-the-dropper/}, language = {English}, urldate = {2020-01-06} } Talking to Dridex (part 0) – inside the dropper
Dridex
2015-05-17CERT.PLMaciej Kotowicz
@online{kotowicz:20150517:newest:1b5db0b, author = {Maciej Kotowicz}, title = {{Newest addition to a happy family: KBOT}}, date = {2015-05-17}, organization = {CERT.PL}, url = {https://lokalhost.pl/txt/newest_addition_to_happy_family_kbot.17.05.2015.txt}, language = {English}, urldate = {2020-04-06} } Newest addition to a happy family: KBOT
Bolek
2015-03-07CERT.PLŁukasz Siewierski
@online{siewierski:20150307:slave:fa94a3f, author = {Łukasz Siewierski}, title = {{Slave, Banatrix and ransomware}}, date = {2015-03-07}, organization = {CERT.PL}, url = {https://www.cert.pl/en/news/single/slave-banatrix-and-ransomware/}, language = {English}, urldate = {2019-11-23} } Slave, Banatrix and ransomware
Slave
2014-12-15CERT.PLCERT.PL
@online{certpl:20141215:banatrix:ff1a5a2, author = {CERT.PL}, title = {{Banatrix – an indepth look}}, date = {2014-12-15}, organization = {CERT.PL}, url = {https://www.cert.pl/en/news/single/banatrix-an-indepth-look/}, language = {English}, urldate = {2019-10-23} } Banatrix – an indepth look
Banatrix
2011-06-03CERT Polska / NASKCERT.PL
@techreport{certpl:20110603:botnet:fd65588, author = {CERT.PL}, title = {{Botnet Hamweq - analiza}}, date = {2011-06-03}, institution = {CERT Polska / NASK}, url = {https://www.cert.pl/wp-content/uploads/2011/06/201106_hamweq.pdf}, language = {Polish}, urldate = {2019-11-28} } Botnet Hamweq - analiza
Hamweq