Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2008-11-26FireEyeJulia Wolf
Technical details of Srizbi's domain generation algorithm
Szribi
2008-11-24NoVirusThanks BlogNoVirusThanks Blog
I-Worm/Nuwar.W + Rustock.E Variant – Analysis
Rustock
2008-10-15SecureworksJoe Stewart
The Return of Warezov
Warezov
2008-06-10ZDNetDancho Danchev
Who's behind the GPcode ransomware?
2008-06-08vilgeforce
Потомок «нецензурного» трояна или как воруют пароли на FTP
Obscene
2008-05-18ThreatExpertSergei Shevchenko
Rustock.C – Unpacking a Nested Doll
Rustock
2008-01-07Royal Air ForceMenwith Hill Station
4th Party Collection: Taking Advantage of Non-Partner Computer Network Exploitation Activity
2008-01-01Dr.WebVyacheslav Rusakoff
Win32.Ntldrbot (aka Rustock.C) no longer a myth, no longer a threat
Rustock
2007-12-16SecureworksJoe Stewart
Pushdo - Analysis of a Modern Malware Distribution System
Pushdo
2007-12-04SecureworksJoe Stewart
Inside the "Ron Paul" Spam Botnet
Szribi
2007-11-01Virus BulletinElia Florio, Kimmo Kasslin
Spam from the kernel
Szribi
2007-10-31SymantecLiam O Murchu
Trojan.Bayrob Strikes Again!
SuppoBox
2007-10-22Kaspersky LabsKaspersky Labs
Malware-Entwicklung im ersten Halbjahr 2007
HxDef
2007-10-01Arbor NetworksJose Nazario
BlackEnergy DDoS Bot Analysis
BlackEnergy
2007-07-17SymantecElia Florio
Trojan.Gpcoder.E
GPCode
2007-04-03USENIXKen Chiang, Levi Lloyd
A Case Study of the Rustock Rootkit and Spam Bot
Rustock
2007-03-20SecureworksDon Jackson
Gozi Trojan
Gozi
2007-01-09SecureworksJoe Stewart
A Rustock-ing Stuffer
Rustock
2006-11-13Secure Science CorporationMicael Ligh
Malware Case Study - ZeusMalware
Zeus
2006-06-26Kaspersky LabsKaspersky
Erpresser
GPCode