Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2011-08-27MicrosoftMatt McCormack
@online{mccormack:20110827:mortoa:3f5b3b0, author = {Matt McCormack}, title = {{Morto.A}}, date = {2011-08-27}, organization = {Microsoft}, url = {https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Worm:Win32/Morto.A}, language = {English}, urldate = {2020-01-06} } Morto.A
Morto
2011-08-24Kaspersky LabsJorge Mieres
@online{mieres:20110824:ice:2dd7e13, author = {Jorge Mieres}, title = {{Ice IX, the first crimeware based on the leaked ZeuS sources}}, date = {2011-08-24}, organization = {Kaspersky Labs}, url = {https://securelist.com/ice-ix-the-first-crimeware-based-on-the-leaked-zeus-sources/29577/}, language = {English}, urldate = {2020-03-02} } Ice IX, the first crimeware based on the leaked ZeuS sources
Ice IX
2011-08-09FireEyeAtif Mushtaq
@online{mushtaq:20110809:harnig:7920bd4, author = {Atif Mushtaq}, title = {{Harnig is Back}}, date = {2011-08-09}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2011/08/harnig-is-back.html}, language = {English}, urldate = {2019-12-20} } Harnig is Back
Harnig
2011-08-04Stop Malvertising RootkitsKimberly
@online{kimberly:20110804:analysis:fcb91de, author = {Kimberly}, title = {{Analysis of ngrBot}}, date = {2011-08-04}, organization = {Stop Malvertising Rootkits}, url = {http://stopmalvertising.com/rootkits/analysis-of-ngrbot.html}, language = {English}, urldate = {2019-12-04} } Analysis of ngrBot
NgrBot
2011-08-03SecureworksJoe Stewart
@online{stewart:20110803:htran:7a67164, author = {Joe Stewart}, title = {{HTran and the Advanced Persistent Threat}}, date = {2011-08-03}, organization = {Secureworks}, url = {https://www.secureworks.com/research/htran}, language = {English}, urldate = {2020-01-08} } HTran and the Advanced Persistent Threat
HTran
2011-07-28KrebsOnSecurityBrian Krebs
@online{krebs:20110728:trojan:2335232, author = {Brian Krebs}, title = {{Trojan Tricks Victims Into Transferring Funds}}, date = {2011-07-28}, organization = {KrebsOnSecurity}, url = {https://krebsonsecurity.com/2011/07/trojan-tricks-victims-into-transfering-funds/}, language = {English}, urldate = {2019-12-20} } Trojan Tricks Victims Into Transferring Funds
UrlZone
2011-07-27Contagiodump BlogMila Parkour
@online{parkour:20110727:jul:7a63577, author = {Mila Parkour}, title = {{Jul 25 Mac Olyx backdoor + Gh0st Backdoor in RAR archive related to July 2009 Ürümqi riots in China (Samples included)}}, date = {2011-07-27}, organization = {Contagiodump Blog}, url = {http://contagiodump.blogspot.com/2011/07/jul-25-mac-olyx-gh0st-backdoor-in-rar.html}, language = {English}, urldate = {2019-12-20} } Jul 25 Mac Olyx backdoor + Gh0st Backdoor in RAR archive related to July 2009 Ürümqi riots in China (Samples included)
Olyx Gh0stnet
2011-07-26ComputerworldJeremy Kirk
@online{kirk:20110726:spyeye:a7ad044, author = {Jeremy Kirk}, title = {{SpyEye Trojan defeating online banking defenses}}, date = {2011-07-26}, organization = {Computerworld}, url = {https://www.computerworld.com/article/2509482/spyeye-trojan-defeating-online-banking-defenses.html}, language = {English}, urldate = {2020-01-13} } SpyEye Trojan defeating online banking defenses
SpyEye
2011-07-14ESET ResearchDavid Harley
@online{harley:20110714:cycbot:9e18833, author = {David Harley}, title = {{Cycbot: Ready to Ride}}, date = {2011-07-14}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2011/07/14/cycbot-ready-to-ride/}, language = {English}, urldate = {2019-11-14} } Cycbot: Ready to Ride
CycBot
2011-07-10Michael Schierl
@online{schierl:20110710:facts:fb33368, author = {Michael Schierl}, title = {{Facts and myths about antivirus evasion with Metasploit}}, date = {2011-07-10}, url = {http://schierlm.users.sourceforge.net/avevasion.html}, language = {English}, urldate = {2020-08-24} } Facts and myths about antivirus evasion with Metasploit
Meterpreter
2011-07-08Dr.WebDr. Web
@online{web:20110708:trojanmayachok2:5c42099, author = {Dr. Web}, title = {{Trojan.Mayachok.2: анализ первого известного VBR-буткита}}, date = {2011-07-08}, organization = {Dr.Web}, url = {https://news.drweb.ru/?i=1772&c=23&lng=ru&p=0}, language = {Russian}, urldate = {2020-01-06} } Trojan.Mayachok.2: анализ первого известного VBR-буткита
Rovnix
2011-07-07Contagio DumpMila Parkour
@online{parkour:20110707:rootkit:501fe3d, author = {Mila Parkour}, title = {{Rootkit TDL-4 (TDSS, Alureon.DX, Olmarik, TDL) 32-bit and 64-bit Sample + Analysis links - Update July 7}}, date = {2011-07-07}, organization = {Contagio Dump}, url = {http://contagiodump.blogspot.com/2011/02/tdss-tdl-4-alureon-32-bit-and-64-bit.html}, language = {English}, urldate = {2019-12-18} } Rootkit TDL-4 (TDSS, Alureon.DX, Olmarik, TDL) 32-bit and 64-bit Sample + Analysis links - Update July 7
Alureon
2011-07-06Kaspersky LabsVyacheslav Zakorzhevsky
@online{zakorzhevsky:20110706:cybercriminals:78ad047, author = {Vyacheslav Zakorzhevsky}, title = {{Cybercriminals switch from MBR to NTFS}}, date = {2011-07-06}, organization = {Kaspersky Labs}, url = {https://securelist.com/cybercriminals-switch-from-mbr-to-ntfs-2/29117/}, language = {English}, urldate = {2019-12-20} } Cybercriminals switch from MBR to NTFS
Rovnix
2011-07-04Kernelmode.info Forumsrkhunter
@online{rkhunter:20110704:winntrovnix:8a594f6, author = {rkhunter}, title = {{WinNT/Rovnix (alias Mayachok, Cidox, BkLoader)}}, date = {2011-07-04}, organization = {Kernelmode.info Forums}, url = {http://www.kernelmode.info/forum/viewtopic.php?f=16&t=981}, language = {English}, urldate = {2019-07-11} } WinNT/Rovnix (alias Mayachok, Cidox, BkLoader)
Rovnix
2011-07SymantecNicolas Falliere
@techreport{falliere:201107:sality:85158ba, author = {Nicolas Falliere}, title = {{Sality: Story of a Peerto-Peer Viral Network}}, date = {2011-07}, institution = {Symantec}, url = {https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/sality_peer_to_peer_viral_network.pdf}, language = {English}, urldate = {2019-11-28} } Sality: Story of a Peerto-Peer Viral Network
Sality
2011-06-29SymantecJohn McDonald
@online{mcdonald:20110629:inside:b955948, author = {John McDonald}, title = {{Inside a Back Door Attack}}, date = {2011-06-29}, organization = {Symantec}, url = {https://web.archive.org/web/20140816135909/https://www.symantec.com/connect/blogs/inside-back-door-attack}, language = {English}, urldate = {2020-04-21} } Inside a Back Door Attack
Ghost RAT Dust Storm
2011-06-29SymantecJohn McDonald
@online{mcdonald:20110629:inside:a85984a, author = {John McDonald}, title = {{Inside a Back Door Attack}}, date = {2011-06-29}, organization = {Symantec}, url = {https://www.symantec.com/connect/blogs/inside-back-door-attack}, language = {English}, urldate = {2020-01-06} } Inside a Back Door Attack
Dust Storm
2011-06-22Doctor WebDoctor Web
@online{web:20110622:criminals:e962335, author = {Doctor Web}, title = {{Criminals gain control over Mac with BackDoor.Olyx}}, date = {2011-06-22}, organization = {Doctor Web}, url = {https://news.drweb.com/show/?i=1750&lng=en&c=14}, language = {English}, urldate = {2019-07-10} } Criminals gain control over Mac with BackDoor.Olyx
Olyx
2011-06-03CERT Polska / NASKCERT.PL
@techreport{certpl:20110603:botnet:fd65588, author = {CERT.PL}, title = {{Botnet Hamweq - analiza}}, date = {2011-06-03}, institution = {CERT Polska / NASK}, url = {https://www.cert.pl/wp-content/uploads/2011/06/201106_hamweq.pdf}, language = {Polish}, urldate = {2019-11-28} } Botnet Hamweq - analiza
Hamweq
2011-06-03SourceforgeAni-Shell
@online{anishell:20110603:anishell:6870af0, author = {Ani-Shell}, title = {{Ani-Shell}}, date = {2011-06-03}, organization = {Sourceforge}, url = {http://ani-shell.sourceforge.net/}, language = {English}, urldate = {2020-01-13} } Ani-Shell
Ani-Shell