Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2009-03-28Infinitum LabsInformation Warfare Monitor
@techreport{monitor:20090328:tracking:dffad13, author = {Information Warfare Monitor}, title = {{Tracking GhostNet: Investigating a Cyber Espionage Network}}, date = {2009-03-28}, institution = {Infinitum Labs}, url = {http://www.nartv.org/mirror/ghostnet.pdf}, language = {English}, urldate = {2022-09-30} } Tracking GhostNet: Investigating a Cyber Espionage Network
Ghost RAT GhostNet
2009-03-17Marshal8e6Rodel Mendrez
@online{mendrez:20090317:gheg:9c244e1, author = {Rodel Mendrez}, title = {{Gheg spambot}}, date = {2009-03-17}, organization = {Marshal8e6}, url = {https://web.archive.org/web/20090428005953/http://www.marshal8e6.com/trace/i/Gheg,spambot.897~.asp}, language = {English}, urldate = {2023-03-16} } Gheg spambot
Tofsee
2009-03-08SRI InternationalPhillip Porras, Hassen Saidi, Vinod Yegneswaran
@online{porras:20090308:conficker:e525ea4, author = {Phillip Porras and Hassen Saidi and Vinod Yegneswaran}, title = {{Conficker C Analysis}}, date = {2009-03-08}, organization = {SRI International}, url = {http://www.csl.sri.com/users/vinod/papers/Conficker/addendumC/index.html}, language = {English}, urldate = {2020-01-06} } Conficker C Analysis
Conficker
2009-03-04FireEyeAtif Mushtaq
@online{mushtaq:20090304:bancos:7666ba2, author = {Atif Mushtaq}, title = {{‘Bancos’ - A Brazilian Crook}}, date = {2009-03-04}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2009/03/bancos-a-brazilian-crook.html}, language = {English}, urldate = {2021-01-25} } ‘Bancos’ - A Brazilian Crook
bancos
2009-03Shishir Nagaraja, Ross Anderson
@techreport{nagaraja:200903:snooping:97d62e1, author = {Shishir Nagaraja and Ross Anderson}, title = {{The snooping dragon:social-malware surveillanceof the Tibetan movement}}, date = {2009-03}, institution = {}, url = {https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.pdf}, language = {English}, urldate = {2019-11-08} } The snooping dragon:social-malware surveillanceof the Tibetan movement
GhostNet
2009SymantecNicolas Falliere, Eric Chien
@techreport{falliere:2009:zeus:73559c2, author = {Nicolas Falliere and Eric Chien}, title = {{Zeus: King of the Bots}}, date = {2009}, institution = {Symantec}, url = {http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/zeus_king_of_bots.pdf}, language = {English}, urldate = {2020-01-07} } Zeus: King of the Bots
Zeus
2009Sunbelt Malware Research LabsChandra Prakash
@techreport{prakash:2009:rootkit:83f212e, author = {Chandra Prakash}, title = {{Rootkit Installation and Obfuscation in Rustock}}, date = {2009}, institution = {Sunbelt Malware Research Labs}, url = {http://sunbeltsecurity.com/dl/Rootkit%20Installation%20and%20Obfuscation%20in%20Rustock.pdf}, language = {English}, urldate = {2019-07-09} } Rootkit Installation and Obfuscation in Rustock
Rustock
2009Kaspersky LabsKaspersky Labs
@online{labs:2009:kaspersky:546f640, author = {Kaspersky Labs}, title = {{Kaspersky Lab analyses new version of Kido (Conficker)}}, date = {2009}, organization = {Kaspersky Labs}, url = {https://www.kaspersky.com/about/press-releases/2009_kaspersky-lab-analyses-new-version-of-kido--conficker}, language = {English}, urldate = {2019-11-25} } Kaspersky Lab analyses new version of Kido (Conficker)
Conficker
2008-11-30ThreatExpertSergei Shevchenko
@online{shevchenko:20081130:agentbtz:8c68643, author = {Sergei Shevchenko}, title = {{Agent.btz - A Threat That Hit Pentagon}}, date = {2008-11-30}, organization = {ThreatExpert}, url = {http://blog.threatexpert.com/2008/11/agentbtz-threat-that-hit-pentagon.html}, language = {English}, urldate = {2020-01-08} } Agent.btz - A Threat That Hit Pentagon
Agent.BTZ
2008-11-26FireEyeJulia Wolf
@online{wolf:20081126:technical:4327f35, author = {Julia Wolf}, title = {{Technical details of Srizbi's domain generation algorithm}}, date = {2008-11-26}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2008/11/technical-details-of-srizbis-domain-generation-algorithm.html}, language = {English}, urldate = {2019-12-20} } Technical details of Srizbi's domain generation algorithm
Szribi
2008-11-24NoVirusThanks BlogNoVirusThanks Blog
@online{blog:20081124:iwormnuwarw:424455b, author = {NoVirusThanks Blog}, title = {{I-Worm/Nuwar.W + Rustock.E Variant – Analysis}}, date = {2008-11-24}, organization = {NoVirusThanks Blog}, url = {http://blog.novirusthanks.org/2008/11/i-wormnuwarw-rustocke-variant-analysis/}, language = {English}, urldate = {2019-10-15} } I-Worm/Nuwar.W + Rustock.E Variant – Analysis
Rustock
2008-06-10ZDNetDancho Danchev
@online{danchev:20080610:whos:504e579, author = {Dancho Danchev}, title = {{Who's behind the GPcode ransomware?}}, date = {2008-06-10}, organization = {ZDNet}, url = {http://www.zdnet.com/article/whos-behind-the-gpcode-ransomware/}, language = {English}, urldate = {2019-12-18} } Who's behind the GPcode ransomware?
2008-06-08vilgeforce
@online{vilgeforce:20080608:ftp:e0e3fa7, author = {vilgeforce}, title = {{Потомок «нецензурного» трояна или как воруют пароли на FTP}}, date = {2008-06-08}, url = {https://habr.com/ru/post/27053/}, language = {Russian}, urldate = {2020-03-09} } Потомок «нецензурного» трояна или как воруют пароли на FTP
Obscene
2008-05-18ThreatExpertSergei Shevchenko
@online{shevchenko:20080518:rustockc:503b03d, author = {Sergei Shevchenko}, title = {{Rustock.C – Unpacking a Nested Doll}}, date = {2008-05-18}, organization = {ThreatExpert}, url = {http://blog.threatexpert.com/2008/05/rustockc-unpacking-nested-doll.html}, language = {English}, urldate = {2020-01-12} } Rustock.C – Unpacking a Nested Doll
Rustock
2008-01-07Royal Air ForceMenwith Hill Station
@techreport{station:20080107:4th:2364e1e, author = {Menwith Hill Station}, title = {{4th Party Collection: Taking Advantage of Non-Partner Computer Network Exploitation Activity}}, date = {2008-01-07}, institution = {Royal Air Force}, url = {https://www.spiegel.de/media/f6f628ad-0001-0014-0000-000000035680/media-35680.pdf}, language = {English}, urldate = {2023-05-24} } 4th Party Collection: Taking Advantage of Non-Partner Computer Network Exploitation Activity
2008Dr.WebVyacheslav Rusakoff
@techreport{rusakoff:2008:win32ntldrbot:f1cd6dd, author = {Vyacheslav Rusakoff}, title = {{Win32.Ntldrbot (aka Rustock.C) no longer a myth, no longer a threat}}, date = {2008}, institution = {Dr.Web}, url = {http://www.drweb.com/upload/6c5e138f917290cb99224a8f8226354f_1210062403_DDOCUMENTSArticales_PRDrWEB_RustockC_eng.pdf}, language = {English}, urldate = {2019-12-24} } Win32.Ntldrbot (aka Rustock.C) no longer a myth, no longer a threat
Rustock
2007-12-16SecureworksJoe Stewart
@online{stewart:20071216:pushdo:6a66753, author = {Joe Stewart}, title = {{Pushdo - Analysis of a Modern Malware Distribution System}}, date = {2007-12-16}, organization = {Secureworks}, url = {https://www.secureworks.com/research/pushdo}, language = {English}, urldate = {2019-07-09} } Pushdo - Analysis of a Modern Malware Distribution System
Pushdo
2007-12-04SecureworksJoe Stewart
@online{stewart:20071204:inside:88b07d9, author = {Joe Stewart}, title = {{Inside the "Ron Paul" Spam Botnet}}, date = {2007-12-04}, organization = {Secureworks}, url = {https://www.secureworks.com/research/srizbi}, language = {English}, urldate = {2020-01-08} } Inside the "Ron Paul" Spam Botnet
Szribi
2007-11-01Virus BulletinKimmo Kasslin, Elia Florio
@online{kasslin:20071101:spam:8c0c4cd, author = {Kimmo Kasslin and Elia Florio}, title = {{Spam from the kernel}}, date = {2007-11-01}, organization = {Virus Bulletin}, url = {https://www.virusbulletin.com/virusbulletin/2007/11/spam-kernel}, language = {English}, urldate = {2020-05-04} } Spam from the kernel
Szribi
2007-10-31SymantecLiam O Murchu
@online{murchu:20071031:trojanbayrob:fe79efb, author = {Liam O Murchu}, title = {{Trojan.Bayrob Strikes Again!}}, date = {2007-10-31}, organization = {Symantec}, url = {https://www.symantec.com/connect/blogs/trojanbayrob-strikes-again-1}, language = {English}, urldate = {2020-01-13} } Trojan.Bayrob Strikes Again!
SuppoBox