Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2008-11-24NoVirusThanks BlogNoVirusThanks Blog
@online{blog:20081124:iwormnuwarw:424455b, author = {NoVirusThanks Blog}, title = {{I-Worm/Nuwar.W + Rustock.E Variant – Analysis}}, date = {2008-11-24}, organization = {NoVirusThanks Blog}, url = {http://blog.novirusthanks.org/2008/11/i-wormnuwarw-rustocke-variant-analysis/}, language = {English}, urldate = {2019-10-15} } I-Worm/Nuwar.W + Rustock.E Variant – Analysis
Rustock
2008-06-10ZDNetDancho Danchev
@online{danchev:20080610:whos:504e579, author = {Dancho Danchev}, title = {{Who's behind the GPcode ransomware?}}, date = {2008-06-10}, organization = {ZDNet}, url = {http://www.zdnet.com/article/whos-behind-the-gpcode-ransomware/}, language = {English}, urldate = {2019-12-18} } Who's behind the GPcode ransomware?
2008-06-08vilgeforce
@online{vilgeforce:20080608:ftp:e0e3fa7, author = {vilgeforce}, title = {{Потомок «нецензурного» трояна или как воруют пароли на FTP}}, date = {2008-06-08}, url = {https://habr.com/ru/post/27053/}, language = {Russian}, urldate = {2020-03-09} } Потомок «нецензурного» трояна или как воруют пароли на FTP
Obscene
2008-05-18ThreatExpertSergei Shevchenko
@online{shevchenko:20080518:rustockc:503b03d, author = {Sergei Shevchenko}, title = {{Rustock.C – Unpacking a Nested Doll}}, date = {2008-05-18}, organization = {ThreatExpert}, url = {http://blog.threatexpert.com/2008/05/rustockc-unpacking-nested-doll.html}, language = {English}, urldate = {2020-01-12} } Rustock.C – Unpacking a Nested Doll
Rustock
2008Dr.WebVyacheslav Rusakoff
@techreport{rusakoff:2008:win32ntldrbot:f1cd6dd, author = {Vyacheslav Rusakoff}, title = {{Win32.Ntldrbot (aka Rustock.C) no longer a myth, no longer a threat}}, date = {2008}, institution = {Dr.Web}, url = {http://www.drweb.com/upload/6c5e138f917290cb99224a8f8226354f_1210062403_DDOCUMENTSArticales_PRDrWEB_RustockC_eng.pdf}, language = {English}, urldate = {2019-12-24} } Win32.Ntldrbot (aka Rustock.C) no longer a myth, no longer a threat
Rustock
2007-12-16SecureworksJoe Stewart
@online{stewart:20071216:pushdo:6a66753, author = {Joe Stewart}, title = {{Pushdo - Analysis of a Modern Malware Distribution System}}, date = {2007-12-16}, organization = {Secureworks}, url = {https://www.secureworks.com/research/pushdo}, language = {English}, urldate = {2019-07-09} } Pushdo - Analysis of a Modern Malware Distribution System
Pushdo
2007-12-04SecureworksJoe Stewart
@online{stewart:20071204:inside:88b07d9, author = {Joe Stewart}, title = {{Inside the "Ron Paul" Spam Botnet}}, date = {2007-12-04}, organization = {Secureworks}, url = {https://www.secureworks.com/research/srizbi}, language = {English}, urldate = {2020-01-08} } Inside the "Ron Paul" Spam Botnet
Szribi
2007-11-01Virus BulletinKimmo Kasslin, Elia Florio
@online{kasslin:20071101:spam:8c0c4cd, author = {Kimmo Kasslin and Elia Florio}, title = {{Spam from the kernel}}, date = {2007-11-01}, organization = {Virus Bulletin}, url = {https://www.virusbulletin.com/virusbulletin/2007/11/spam-kernel}, language = {English}, urldate = {2020-05-04} } Spam from the kernel
Szribi
2007-10-31SymantecLiam O Murchu
@online{murchu:20071031:trojanbayrob:fe79efb, author = {Liam O Murchu}, title = {{Trojan.Bayrob Strikes Again!}}, date = {2007-10-31}, organization = {Symantec}, url = {https://www.symantec.com/connect/blogs/trojanbayrob-strikes-again-1}, language = {English}, urldate = {2020-01-13} } Trojan.Bayrob Strikes Again!
SuppoBox
2007-10-22Kaspersky LabsKaspersky Labs
@online{labs:20071022:malwareentwicklung:8050999, author = {Kaspersky Labs}, title = {{Malware-Entwicklung im ersten Halbjahr 2007}}, date = {2007-10-22}, organization = {Kaspersky Labs}, url = {https://de.securelist.com/malware-entwicklung-im-ersten-halbjahr-2007/59574/}, language = {German}, urldate = {2020-03-19} } Malware-Entwicklung im ersten Halbjahr 2007
HxDef
2007-10Arbor NetworksJose Nazario
@techreport{nazario:200710:blackenergy:f414256, author = {Jose Nazario}, title = {{BlackEnergy DDoS Bot Analysis}}, date = {2007-10}, institution = {Arbor Networks}, url = {http://atlas-public.ec2.arbor.net/docs/BlackEnergy+DDoS+Bot+Analysis.pdf}, language = {English}, urldate = {2020-01-07} } BlackEnergy DDoS Bot Analysis
BlackEnergy
2007-07-17SymantecElia Florio
@online{florio:20070717:trojangpcodere:f491e6b, author = {Elia Florio}, title = {{Trojan.Gpcoder.E}}, date = {2007-07-17}, organization = {Symantec}, url = {https://www.symantec.com/security_response/writeup.jsp?docid=2007-071711-3132-99&tabid=2}, language = {English}, urldate = {2020-01-10} } Trojan.Gpcoder.E
GPCode
2007-04-03USENIXKen Chiang, Levi Lloyd
@online{chiang:20070403:case:5dd68c2, author = {Ken Chiang and Levi Lloyd}, title = {{A Case Study of the Rustock Rootkit and Spam Bot}}, date = {2007-04-03}, organization = {USENIX}, url = {https://www.usenix.org/legacy/event/hotbots07/tech/full_papers/chiang/chiang_html/index.html}, language = {English}, urldate = {2019-12-17} } A Case Study of the Rustock Rootkit and Spam Bot
Rustock
2007-03-20SecureworksDon Jackson
@online{jackson:20070320:gozi:701fe90, author = {Don Jackson}, title = {{Gozi Trojan}}, date = {2007-03-20}, organization = {Secureworks}, url = {https://www.secureworks.com/research/gozi}, language = {English}, urldate = {2020-01-10} } Gozi Trojan
Gozi
2007-01-09SecureworksJoe Stewart
@online{stewart:20070109:rustocking:861999a, author = {Joe Stewart}, title = {{A Rustock-ing Stuffer}}, date = {2007-01-09}, organization = {Secureworks}, url = {https://www.secureworks.com/blog/research-21041}, language = {English}, urldate = {2019-11-21} } A Rustock-ing Stuffer
Rustock
2006-11-13Secure Science CorporationMicael Ligh
@techreport{ligh:20061113:malware:d305d70, author = {Micael Ligh}, title = {{Malware Case Study - ZeusMalware}}, date = {2006-11-13}, institution = {Secure Science Corporation}, url = {https://www.mnin.org/write/ZeusMalware.pdf}, language = {English}, urldate = {2019-11-23} } Malware Case Study - ZeusMalware
Zeus
2006-06-26Kaspersky LabsKaspersky
@online{kaspersky:20060626:erpresser:6c57dc7, author = {Kaspersky}, title = {{Erpresser}}, date = {2006-06-26}, organization = {Kaspersky Labs}, url = {https://de.securelist.com/analysis/59479/erpresser/}, language = {German}, urldate = {2020-01-08} } Erpresser
GPCode
2006-01-15ESET ResearchVirus Radar
@online{radar:20060115:win32neshta:e4ec5b0, author = {Virus Radar}, title = {{Win32/Neshta}}, date = {2006-01-15}, organization = {ESET Research}, url = {https://www.virusradar.com/en/Win32_Neshta.A/description}, language = {English}, urldate = {2019-12-10} } Win32/Neshta
neshta
2004-04-15SANS GIACMatt Goldencrown
@online{goldencrown:20040415:mydoom:38c5e17, author = {Matt Goldencrown}, title = {{MyDoom is Your Doom: An Analysis of the MyDoom Virus}}, date = {2004-04-15}, organization = {SANS GIAC}, url = {https://www.giac.org/paper/gcih/568/mydoom-dom-anlysis-mydoom-virus/106069}, language = {English}, urldate = {2019-11-26} } MyDoom is Your Doom: An Analysis of the MyDoom Virus
MyDoom
2004-01-30Applied Watch TechnologiesEric S. Hines
@techreport{hines:20040130:mydoomb:1946152, author = {Eric S. Hines}, title = {{MyDoom.B Worm Analysis}}, date = {2004-01-30}, institution = {Applied Watch Technologies}, url = {http://ivanlef0u.fr/repo/madchat/vxdevl/papers/analysis/mydoom_b_analysis.pdf}, language = {English}, urldate = {2019-10-14} } MyDoom.B Worm Analysis
MyDoom