/vx/Papers/Malware Defense/Malware Analysis/2013/

0 directories 103 files
List Grid
Name
Size Modified
Up
2013-01-02 - Capstone Turbine Corporation Also Targeted in the CFR Watering Hole Attack And More.pdf
121 KiB
2013-01-14 - -Red October- Diplomatic Cyber Attacks Investigation.pdf
2.6 MiB
2013-01-14 - The “Red October” Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies.pdf
1.5 MiB
2013-01-14 - “Red October” Diplomatic Cyber Attacks Investigation.pdf
2.8 MiB
2013-01-17 - “Red October” – Part Two, the Modules.pdf
1.9 MiB
2013-01-18 - Dec 2012 Batchwiper Samples.pdf
103 KiB
2013-01-18 - Polish Takedown Targets ‘Virut’ Botnet.pdf
193 KiB
2013-01-19 - Cooperative Efforts To Shut Down Virut Botnet.pdf
60 KiB
2013-01-21 - Shylock Not the Lone Threat Targeting Skype.pdf
2.7 MiB
2013-01-24 - Linux-SSHDoor.A Backdoored SSH daemon that steals passwords.pdf
616 KiB
2013-01-25 - vSkimmer, Another POS malware.pdf
1.2 MiB
2013-01-27 - Trojan.Win32-Spy.Ranbyus.pdf
768 KiB
2013-01-30 - Backdoor.Barkiofork Targets Aerospace and Defense Industry.pdf
77 KiB
2013-02-03 - The infection of Styx Exploit Kit (Landing page- painterinvoice.ru + Payload- PWS-Ursnif Variant).pdf
422 KiB
2013-02-03 - The infection of Styx Exploit Kit (Landing page- painterinvoice.ru and Payload- PWS-Ursnif Variant).pdf
422 KiB
2013-02-04 - Alina 3.4 (POS Malware).pdf
1.1 MiB
2013-02-04 - What do Win32-Redyms and TDL4 have in common-.pdf
400 KiB
2013-02-16 - Jan 2013 - Linux SSHDoor - sample.pdf
87 KiB
2013-02-19 - APT1- Q&A on Attacks by the Comment Crew.pdf
82 KiB
2013-02-19 - Exclusive- Apple, Macs hit by hackers who targeted Facebook.pdf
85 KiB
2013-02-19 - PLA Unit 61398.pdf
262 KiB
2013-02-22 - Bamital Botnet Takedown Is Successful; Cleanup Underway.pdf
78 KiB
2013-02-22 - Recent Cyberattacks.pdf
41 KiB
2013-02-25 - Caphaw attacking major European banks using webinject plugin.pdf
381 KiB
2013-02-27 - BKDR_RARSTONE- New RAT to Watch Out For.pdf
68 KiB
2013-03-05 - Russian ransomware takes advantage of Windows PowerShell.pdf
956 KiB
2013-03-13 - How Theola malware uses a Chrome plugin for banking fraud.pdf
787 KiB
2013-03-14 - New Uyghur and Tibetan Themed Attacks Using PDF Exploits.pdf
414 KiB
2013-03-20 - Computer Networks in South Korea Are Paralyzed in Cyberattacks.pdf
113 KiB
2013-03-20 - Researchers Uncover ‘TeamSpy’ Attack Campaign Against Government, Research Targets.pdf
185 KiB
2013-03-21 - New Sykipot developments.pdf
1.1 MiB
2013-03-21 - VSkimmer Botnet Targets Credit Card Payment Terminals.pdf
1.7 MiB
2013-03-22 - Who is Anchor Panda.pdf
844 KiB
2013-03-24 - OSX-Pintsized Backdoor Additional Details.pdf
155 KiB
2013-03-29 - Whois Numbered Panda.pdf
110 KiB
2013-03-30 - Fooled by Andromeda.pdf
218 KiB
2013-04-02 - Dark South Korea Total War Review.pdf
850 KiB
2013-04-04 - Who is Clever Kitten.pdf
632 KiB
2013-04-08 - Banking Trojan Carberp- An Epitaph-.pdf
719 KiB
2013-04-11 - Winnti FAQ. More Than Just a Game.pdf
367 KiB
2013-04-11 - Winnti. More than just a game.pdf
725 KiB
2013-04-12 - Who is Samurai Panda.pdf
642 KiB
2013-04-24 - South Korea Incident - New Malware samples.pdf
1.7 MiB
2013-04-26 - Linux-Cdorked.A- New Apache backdoor being used in the wild to serve Blackhole.pdf
200 KiB
2013-05-01 - Linux-CDorked FAQs.pdf
103 KiB
2013-05-02 - The stealthiness of Linux-Cdorked- a clarification.pdf
714 KiB
2013-05-03 - Department of Labor Strategic Web Compromise.pdf
442 KiB
2013-05-08 - Alina- Casting a Shadow on POS.pdf
638 KiB
2013-05-17 - Alina- Following The Shadow Part 1.pdf
1.3 MiB
2013-05-20 - Lockscreen Win32-Lyposit displayed as a fake MacOs app.pdf
413 KiB
2013-05-21 - Unveiling the Locker Bomba (aka Lucky Locker v0.6 aka Lyposit-Adneukine).pdf
994 KiB
2013-05-22 - Mac Spyware- OSX-KitM (Kumar in the Mac).pdf
190 KiB
2013-05-28 - South Korean Financial Companies Targeted by Castov.pdf
124 KiB
2013-05-29 - South Korean Financial Companies Targeted by Castov.pdf
128 KiB
2013-06-03 - Alina- Following The Shadow Part 2.pdf
347 KiB
2013-06-04 - Kaspersky Lab Uncovers ‘Operation NetTraveler,’ a Global Cyberespionage Campaign Targeting Government-Affiliated Organizations and Research Institutes.pdf
205 KiB
2013-06-04 - “NetTraveler is Running!” – Red Star APT Attacks Compromise High-Profile Victims.pdf
987 KiB
2013-06-07 - KeyBoy, Targeted Attacks against Vietnam and India.pdf
892 KiB
2013-06-17 - CrowdStrike Falcon Traces Attacks Back To Hackers.pdf
105 KiB
2013-06-19 - Your Facebook connection is now secured! Thank you for your support!.pdf
104 KiB
2013-06-26 - Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War.pdf
277 KiB
2013-07-15 - Signed Mac Malware Using Right-to-Left Override Trick.pdf
673 KiB
2013-07-22 - Multisystem Trojan Janicab attacks Windows and MacOSX via scripts.pdf
207 KiB
2013-07-25 - ZeroAccess uses Self-Debugging.pdf
108 KiB
2013-07-30 - Versatile and infectious- Win64-Expiro is a cross‑platform file infector.pdf
624 KiB
2013-07-31 - Secrets of the Comfoo Masters.pdf
296 KiB
2013-08-01 - Andromeda 2.7 features.pdf
1.4 MiB
2013-08-01 - Sophos Discovers ZeroAccess Using RLO.pdf
115 KiB
2013-08-02 - Surtr Malware Family Targeting the Tibetan Community.pdf
117 KiB
2013-08-07 - Thieves Reaching for Linux—”Hand of Thief” Trojan Targets Linux #INTH3WILD.pdf
323 KiB
2013-08-07 - Thieves Reaching for Linux—”Hand of Thief” Trojan Targets Linux INTH3WILD.pdf
323 KiB
2013-08-12 - Taleret strings - APT (1).pdf
61 KiB
2013-08-13 - Inside a ‘Reveton’ Ransomware Operation.pdf
465 KiB
2013-08-13 - PowerLoader Injection – Something truly amazing.pdf
196 KiB
2013-08-25 - The Compromised Devices of the Carna Botnet.pdf
37 KiB
2013-08-27 - Linux Trojan “Hand of Thief” ungloved.pdf
209 KiB
2013-09-01 - Yet another Andromeda - Gamarue analysis.pdf
766 KiB
2013-09-04 - Sykipot Now Targeting US Civil Aviation Sector Information.pdf
2.7 MiB
2013-09-05 - Large botnet cause of recent Tor network overload.pdf
192 KiB
2013-09-06 - Evasive Tactics- Taidoor.pdf
114 KiB
2013-09-11 - The “Kimsuky” Operation- A North Korean APT-.pdf
879 KiB
2013-09-17 - Hidden Lynx – Professional Hackers for Hire.pdf
1.1 MiB
2013-09-18 - A New Wave Of WIN32-CAPHAW Attacks - A ThreatLabZ Analysis.pdf
1.1 MiB
2013-09-21 - Operation DeputyDog- Zero-Day (CVE-2013-3893) Attack Against Japanese Targets.pdf
179 KiB
2013-09-24 - Now You See Me - H-worm by Houdini.pdf
85 KiB
2013-09-24 - OSX-Leverage.a Analysis.pdf
352 KiB
2013-09-25 - The Icefog APT- A Tale of Cloak and Three Daggers.pdf
2.2 MiB
2013-09-25 - Win32-64-Napolar- New Trojan shines on the cyber crime-scene.pdf
1006 KiB
2013-09-25 - Win32-Napolar – A new bot on the block.pdf
325 KiB
2013-09-26 - New Solarbot Malware Debuts, Creator Publicly Advertising.pdf
184 KiB
2013-10-10 - Regional Conflict and Cyber Blowback.pdf
56 KiB
2013-10-14 - PE_MOFKSYS.A.pdf
97 KiB
2013-10-16 - CrowdCasts Monthly- You Have an Adversary Problem.pdf
1.6 MiB
2013-11-06 - VICEROY TIGER Delivers New Zero-Day Exploit.pdf
595 KiB
2013-11-09 - T-cmd.cpp.pdf
852 KiB
2013-12-04 - The Internet of Everything, Including Malware.pdf
421 KiB
2013-12-09 - The Curious Case of the Malicious IIS Module.pdf
538 KiB
2013-12-12 - OPERATION “KE3CHANG”-Targeted Attacks Against Ministries of Foreign Affairs.pdf
141 KiB
2013-12-17 - Bebloh - a well-known banking Trojan with noteworthy innovations.pdf
62 KiB
2013-12-18 - CryptoLocker Ransomware.pdf
1.4 MiB
2013-12-18 - Qadars – a banking Trojan with the Netherlands in its sights.pdf
1.3 MiB
2013-12-23 - Mozi, Another Botnet Using DHT.pdf
2.2 MiB
2013-12-31 - VirusTotal Report for Bee.pdf
38 KiB