Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2009Sunbelt Malware Research LabsChandra Prakash
@techreport{prakash:2009:rootkit:83f212e, author = {Chandra Prakash}, title = {{Rootkit Installation and Obfuscation in Rustock}}, date = {2009}, institution = {Sunbelt Malware Research Labs}, url = {http://sunbeltsecurity.com/dl/Rootkit%20Installation%20and%20Obfuscation%20in%20Rustock.pdf}, language = {English}, urldate = {2019-07-09} } Rootkit Installation and Obfuscation in Rustock
Rustock
2009Kaspersky LabsKaspersky Labs
@online{labs:2009:kaspersky:546f640, author = {Kaspersky Labs}, title = {{Kaspersky Lab analyses new version of Kido (Conficker)}}, date = {2009}, organization = {Kaspersky Labs}, url = {https://www.kaspersky.com/about/press-releases/2009_kaspersky-lab-analyses-new-version-of-kido--conficker}, language = {English}, urldate = {2019-11-25} } Kaspersky Lab analyses new version of Kido (Conficker)
Conficker
2008-11-30ThreatExpertSergei Shevchenko
@online{shevchenko:20081130:agentbtz:8c68643, author = {Sergei Shevchenko}, title = {{Agent.btz - A Threat That Hit Pentagon}}, date = {2008-11-30}, organization = {ThreatExpert}, url = {http://blog.threatexpert.com/2008/11/agentbtz-threat-that-hit-pentagon.html}, language = {English}, urldate = {2020-01-08} } Agent.btz - A Threat That Hit Pentagon
Agent.BTZ
2008-11-26FireEyeJulia Wolf
@online{wolf:20081126:technical:4327f35, author = {Julia Wolf}, title = {{Technical details of Srizbi's domain generation algorithm}}, date = {2008-11-26}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2008/11/technical-details-of-srizbis-domain-generation-algorithm.html}, language = {English}, urldate = {2019-12-20} } Technical details of Srizbi's domain generation algorithm
Szribi
2008-11-24NoVirusThanks BlogNoVirusThanks Blog
@online{blog:20081124:iwormnuwarw:424455b, author = {NoVirusThanks Blog}, title = {{I-Worm/Nuwar.W + Rustock.E Variant – Analysis}}, date = {2008-11-24}, organization = {NoVirusThanks Blog}, url = {http://blog.novirusthanks.org/2008/11/i-wormnuwarw-rustocke-variant-analysis/}, language = {English}, urldate = {2019-10-15} } I-Worm/Nuwar.W + Rustock.E Variant – Analysis
Rustock
2008-06-10ZDNetDancho Danchev
@online{danchev:20080610:whos:504e579, author = {Dancho Danchev}, title = {{Who's behind the GPcode ransomware?}}, date = {2008-06-10}, organization = {ZDNet}, url = {http://www.zdnet.com/article/whos-behind-the-gpcode-ransomware/}, language = {English}, urldate = {2019-12-18} } Who's behind the GPcode ransomware?
2008-06-08vilgeforce
@online{vilgeforce:20080608:ftp:e0e3fa7, author = {vilgeforce}, title = {{Потомок «нецензурного» трояна или как воруют пароли на FTP}}, date = {2008-06-08}, url = {https://habr.com/ru/post/27053/}, language = {Russian}, urldate = {2020-03-09} } Потомок «нецензурного» трояна или как воруют пароли на FTP
Obscene
2008-05-18ThreatExpertSergei Shevchenko
@online{shevchenko:20080518:rustockc:503b03d, author = {Sergei Shevchenko}, title = {{Rustock.C – Unpacking a Nested Doll}}, date = {2008-05-18}, organization = {ThreatExpert}, url = {http://blog.threatexpert.com/2008/05/rustockc-unpacking-nested-doll.html}, language = {English}, urldate = {2020-01-12} } Rustock.C – Unpacking a Nested Doll
Rustock
2008-01-07Royal Air ForceMenwith Hill Station
@techreport{station:20080107:4th:2364e1e, author = {Menwith Hill Station}, title = {{4th Party Collection: Taking Advantage of Non-Partner Computer Network Exploitation Activity}}, date = {2008-01-07}, institution = {Royal Air Force}, url = {https://www.spiegel.de/media/f6f628ad-0001-0014-0000-000000035680/media-35680.pdf}, language = {English}, urldate = {2023-05-24} } 4th Party Collection: Taking Advantage of Non-Partner Computer Network Exploitation Activity
2008Dr.WebVyacheslav Rusakoff
@techreport{rusakoff:2008:win32ntldrbot:f1cd6dd, author = {Vyacheslav Rusakoff}, title = {{Win32.Ntldrbot (aka Rustock.C) no longer a myth, no longer a threat}}, date = {2008}, institution = {Dr.Web}, url = {http://www.drweb.com/upload/6c5e138f917290cb99224a8f8226354f_1210062403_DDOCUMENTSArticales_PRDrWEB_RustockC_eng.pdf}, language = {English}, urldate = {2019-12-24} } Win32.Ntldrbot (aka Rustock.C) no longer a myth, no longer a threat
Rustock
2007-12-16SecureworksJoe Stewart
@online{stewart:20071216:pushdo:6a66753, author = {Joe Stewart}, title = {{Pushdo - Analysis of a Modern Malware Distribution System}}, date = {2007-12-16}, organization = {Secureworks}, url = {https://www.secureworks.com/research/pushdo}, language = {English}, urldate = {2019-07-09} } Pushdo - Analysis of a Modern Malware Distribution System
Pushdo
2007-12-04SecureworksJoe Stewart
@online{stewart:20071204:inside:88b07d9, author = {Joe Stewart}, title = {{Inside the "Ron Paul" Spam Botnet}}, date = {2007-12-04}, organization = {Secureworks}, url = {https://www.secureworks.com/research/srizbi}, language = {English}, urldate = {2020-01-08} } Inside the "Ron Paul" Spam Botnet
Szribi
2007-11-01Virus BulletinKimmo Kasslin, Elia Florio
@online{kasslin:20071101:spam:8c0c4cd, author = {Kimmo Kasslin and Elia Florio}, title = {{Spam from the kernel}}, date = {2007-11-01}, organization = {Virus Bulletin}, url = {https://www.virusbulletin.com/virusbulletin/2007/11/spam-kernel}, language = {English}, urldate = {2020-05-04} } Spam from the kernel
Szribi
2007-10-31SymantecLiam O Murchu
@online{murchu:20071031:trojanbayrob:fe79efb, author = {Liam O Murchu}, title = {{Trojan.Bayrob Strikes Again!}}, date = {2007-10-31}, organization = {Symantec}, url = {https://www.symantec.com/connect/blogs/trojanbayrob-strikes-again-1}, language = {English}, urldate = {2020-01-13} } Trojan.Bayrob Strikes Again!
SuppoBox
2007-10-22Kaspersky LabsKaspersky Labs
@online{labs:20071022:malwareentwicklung:8050999, author = {Kaspersky Labs}, title = {{Malware-Entwicklung im ersten Halbjahr 2007}}, date = {2007-10-22}, organization = {Kaspersky Labs}, url = {https://de.securelist.com/malware-entwicklung-im-ersten-halbjahr-2007/59574/}, language = {German}, urldate = {2020-03-19} } Malware-Entwicklung im ersten Halbjahr 2007
HxDef
2007-10Arbor NetworksJose Nazario
@techreport{nazario:200710:blackenergy:f414256, author = {Jose Nazario}, title = {{BlackEnergy DDoS Bot Analysis}}, date = {2007-10}, institution = {Arbor Networks}, url = {http://pds15.egloos.com/pds/201001/01/66/BlackEnergy_DDoS_Bot_Analysis.pdf}, language = {English}, urldate = {2022-04-25} } BlackEnergy DDoS Bot Analysis
BlackEnergy
2007-07-17SymantecElia Florio
@online{florio:20070717:trojangpcodere:f491e6b, author = {Elia Florio}, title = {{Trojan.Gpcoder.E}}, date = {2007-07-17}, organization = {Symantec}, url = {https://www.symantec.com/security_response/writeup.jsp?docid=2007-071711-3132-99&tabid=2}, language = {English}, urldate = {2020-01-10} } Trojan.Gpcoder.E
GPCode
2007-04-03USENIXKen Chiang, Levi Lloyd
@online{chiang:20070403:case:5dd68c2, author = {Ken Chiang and Levi Lloyd}, title = {{A Case Study of the Rustock Rootkit and Spam Bot}}, date = {2007-04-03}, organization = {USENIX}, url = {https://www.usenix.org/legacy/event/hotbots07/tech/full_papers/chiang/chiang_html/index.html}, language = {English}, urldate = {2019-12-17} } A Case Study of the Rustock Rootkit and Spam Bot
Rustock
2007-03-20SecureworksDon Jackson
@online{jackson:20070320:gozi:701fe90, author = {Don Jackson}, title = {{Gozi Trojan}}, date = {2007-03-20}, organization = {Secureworks}, url = {https://www.secureworks.com/research/gozi}, language = {English}, urldate = {2020-01-10} } Gozi Trojan
Gozi
2007-01-09SecureworksJoe Stewart
@online{stewart:20070109:rustocking:861999a, author = {Joe Stewart}, title = {{A Rustock-ing Stuffer}}, date = {2007-01-09}, organization = {Secureworks}, url = {https://www.secureworks.com/blog/research-21041}, language = {English}, urldate = {2019-11-21} } A Rustock-ing Stuffer
Rustock