Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2009-05-22Trend MicroAlice Decker, David Sancho, Loucif Kharouni, Max Goncharov, Robert McArdle
Pushdo / Cutwail Botnet
Pushdo
2009-05-07SymantecAngela Thigpen, Eric Chien
W32.Qakbot
QakBot
2009-04-01Sophos LabsMike Wood, Niall Fitzgibbon
Conficker.C A Technical Analysis
2009-03-29WikipediaVarious
GhostNet
Gh0stnet GhostNet
2009-03-28Infinitum LabsInformation Warfare Monitor
Tracking GhostNet: Investigating a Cyber Espionage Network
Ghost RAT GhostNet
2009-03-17Marshal8e6Rodel Mendrez
Gheg spambot
Tofsee
2009-03-08SRI InternationalHassen Saidi, Phillip Porras, Vinod Yegneswaran
Conficker C Analysis
Conficker
2009-03-04FireEyeAtif Mushtaq
‘Bancos’ - A Brazilian Crook
bancos
2009-03-01Ross Anderson, Shishir Nagaraja
The snooping dragon:social-malware surveillanceof the Tibetan movement
GhostNet
2009-01-01SymantecEric Chien, Nicolas Falliere
Zeus: King of the Bots
Zeus
2009-01-01Kaspersky LabsKaspersky Labs
Kaspersky Lab analyses new version of Kido (Conficker)
Conficker
2009-01-01Sunbelt Malware Research LabsChandra Prakash
Rootkit Installation and Obfuscation in Rustock
Rustock
2008-11-30ThreatExpertSergei Shevchenko
Agent.btz - A Threat That Hit Pentagon
Agent.BTZ
2008-11-26FireEyeJulia Wolf
Technical details of Srizbi's domain generation algorithm
Szribi
2008-11-24NoVirusThanks BlogNoVirusThanks Blog
I-Worm/Nuwar.W + Rustock.E Variant – Analysis
Rustock
2008-10-15SecureworksJoe Stewart
The Return of Warezov
Warezov
2008-06-10ZDNetDancho Danchev
Who's behind the GPcode ransomware?
2008-06-08vilgeforce
Потомок «нецензурного» трояна или как воруют пароли на FTP
Obscene
2008-05-18ThreatExpertSergei Shevchenko
Rustock.C – Unpacking a Nested Doll
Rustock
2008-01-07Royal Air ForceMenwith Hill Station
4th Party Collection: Taking Advantage of Non-Partner Computer Network Exploitation Activity