Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2010-04-22SymantecPatrick Fitzgerald
Qakbot Steals 2GB of Confidential Data per Week
QakBot
2010-04-06CitizenLabCitizenLab, Information Warfare Monitor, Shadowserver Foundation
SHADOWS IN THE CLOUD: Investigating Cyber Espionage 2.0
Shadow Network
2010-03-07Contagiodump BlogMila Parkour
March 2010 Opachki Trojan update and sample
Opachki
2010-03-03SecureworksJoe Stewart
BlackEnergy Version 2 Threat Analysis
BlackEnergy
2010-02-19MalwareIntelligenceJorge Mieres
SpyEye Bot (Part two). Conversations with the creator of crimeware
SpyEye
2010-01-01MandiantEro Carrera, Peter Silberman
State of Malware: Family Ties
Bredolab Conficker Cutwail KoobFace Oderoor Poison Ivy Rustock Sinowal Szribi Zeus
2009-12-22SymantecJohn McDonald, Masaki Suenaga, Takayoshi Nakayama
Qakbot, Data Thief Unmasked: Part II
QakBot
2009-11-02Contagio DumpMila Parkour
Win32/Opachki.A - Trojan that removes Zeus (but it is not benign)
Opachki
2009-10-08Defence Intelligence, Ministry of Defence UKMatt Thompson
Mariposa Botnet Analysis
Mariposa
2009-08-05ESET ResearchEset
PC Users Threatened by Conficker Worm and new Internet-browser Modifier
FlyStudio
2009-07-08The GuardianMatthew Weaver
Cyber attackers target South Korea and US
Lazarus Group
2009-06-02Contagio DumpMila Parkour
win32update.exe MD5 eec80fd4c7fc5cf5522f0ca4eb2d9c6f
cifty
2009-03-28Infinitum LabsInformation Warfare Monitor
Tracking GhostNet: Investigating a Cyber Espionage Network
Ghost RAT GhostNet
2009-03-08SRI InternationalHassen Saidi, Phillip Porras, Vinod Yegneswaran
Conficker C Analysis
Conficker
2009-03-04FireEyeAtif Mushtaq
‘Bancos’ - A Brazilian Crook
bancos
2009-01-01Sunbelt Malware Research LabsChandra Prakash
Rootkit Installation and Obfuscation in Rustock
Rustock
2008-11-30ThreatExpertSergei Shevchenko
Agent.btz - A Threat That Hit Pentagon
Agent.BTZ
2008-11-26FireEyeJulia Wolf
Technical details of Srizbi's domain generation algorithm
Szribi
2008-05-18ThreatExpertSergei Shevchenko
Rustock.C – Unpacking a Nested Doll
Rustock
2008-01-07Royal Air ForceMenwith Hill Station
4th Party Collection: Taking Advantage of Non-Partner Computer Network Exploitation Activity
2008-01-01Dr.WebVyacheslav Rusakoff
Win32.Ntldrbot (aka Rustock.C) no longer a myth, no longer a threat
Rustock
2006-11-13Secure Science CorporationMicael Ligh
Malware Case Study - ZeusMalware
Zeus
2004-04-15SANS GIACMatt Goldencrown
MyDoom is Your Doom: An Analysis of the MyDoom Virus
MyDoom
2004-01-30Applied Watch TechnologiesEric S. Hines
MyDoom.B Worm Analysis
MyDoom
1997-09-01Phrack Magazinedaemon9
LOKI2 (the implementation)