Click here to download all references as Bib-File.•
2010-05-11
⋅
Symantec
⋅
Qakbot, Data Thief Unmasked: Part I QakBot |
2010-05-03
⋅
Kaspersky Labs
⋅
Heloag has rather no friends, just a master Heloag |
2010-05-03
⋅
Symantec
⋅
A Brief Look at Zeus/Zbot 2.0 Zeus |
2010-04-22
⋅
Symantec
⋅
Qakbot Steals 2GB of Confidential Data per Week QakBot |
2010-04-06
⋅
CitizenLab
⋅
SHADOWS IN THE CLOUD: Investigating Cyber Espionage 2.0 Shadow Network |
2010-03-07
⋅
Contagiodump Blog
⋅
March 2010 Opachki Trojan update and sample Opachki |
2010-03-03
⋅
Secureworks
⋅
BlackEnergy Version 2 Threat Analysis BlackEnergy |
2010-02-19
⋅
MalwareIntelligence
⋅
SpyEye Bot (Part two). Conversations with the creator of crimeware SpyEye |
2010-01-01
⋅
Mandiant
⋅
State of Malware: Family Ties Bredolab Conficker Cutwail KoobFace Oderoor Poison Ivy Rustock Sinowal Szribi Zeus |
2009-12-22
⋅
Symantec
⋅
Qakbot, Data Thief Unmasked: Part II QakBot |
2009-11-02
⋅
Contagio Dump
⋅
Win32/Opachki.A - Trojan that removes Zeus (but it is not benign) Opachki |
2009-10-08
⋅
Defence Intelligence, Ministry of Defence UK
⋅
Mariposa Botnet Analysis Mariposa |
2009-08-05
⋅
ESET Research
⋅
PC Users Threatened by Conficker Worm and new Internet-browser Modifier FlyStudio |
2009-07-08
⋅
The Guardian
⋅
Cyber attackers target South Korea and US Lazarus Group |
2009-06-02
⋅
Contagio Dump
⋅
win32update.exe MD5 eec80fd4c7fc5cf5522f0ca4eb2d9c6f cifty |
2009-03-28
⋅
Infinitum Labs
⋅
Tracking GhostNet: Investigating a Cyber Espionage Network Ghost RAT GhostNet |
2009-03-08
⋅
SRI International
⋅
Conficker C Analysis Conficker |
2009-03-04
⋅
FireEye
⋅
‘Bancos’ - A Brazilian Crook bancos |
2009-01-01
⋅
Sunbelt Malware Research Labs
⋅
Rootkit Installation and Obfuscation in Rustock Rustock |
2008-11-30
⋅
ThreatExpert
⋅
Agent.btz - A Threat That Hit Pentagon Agent.BTZ |
2008-11-26
⋅
FireEye
⋅
Technical details of Srizbi's domain generation algorithm Szribi |
2008-05-18
⋅
ThreatExpert
⋅
Rustock.C – Unpacking a Nested Doll Rustock |
2008-01-07
⋅
Royal Air Force
⋅
4th Party Collection: Taking Advantage of Non-Partner Computer Network Exploitation Activity |
2008-01-01
⋅
Dr.Web
⋅
Win32.Ntldrbot (aka Rustock.C) no longer a myth, no longer a threat Rustock |
2006-11-13
⋅
Secure Science Corporation
⋅
Malware Case Study - ZeusMalware Zeus |
2004-04-15
⋅
SANS GIAC
⋅
MyDoom is Your Doom: An Analysis of the MyDoom Virus MyDoom |
2004-01-30
⋅
Applied Watch Technologies
⋅
MyDoom.B Worm Analysis MyDoom |
1997-09-01
⋅
Phrack Magazine
⋅
LOKI2 (the implementation) |