/vx/Papers/Malware Defense/Malware Analysis/2014/

0 directories 142 files
List Grid
Name
Size Modified
Up
2014-01-14 - The Icefog APT Hits US Targets With Java Backdoor.pdf
362 KiB
2014-01-19 - Vietnamese Malware Gets Very Personal.pdf
290 KiB
2014-01-21 - Digitally signed data-stealing malware targets Mac users in “undelivered courier item” attack.pdf
1.0 MiB
2014-01-22 - Iran and Russia blamed for state-sponsored espionage.pdf
108 KiB
2014-02-02 - U.S. Leads Multi-National Action Against “Gameover Zeus” Botnet and “Cryptolocker” Ransomware, Charges Botnet Administrator.pdf
97 KiB
2014-02-03 - Needle in a haystack.pdf
2.2 MiB
2014-02-06 - Исследуем Linux Botnet «BillGates».pdf
257 KiB
2014-02-10 - The Careto-Mask APT- Frequently Asked Questions.pdf
458 KiB
2014-02-14 - Analysis of DHS NCCIC Indicators.pdf
150 KiB
2014-02-15 - Examining Your Very Own Sefnit Trojan.pdf
54 KiB
2014-02-16 - Analysis of CoinThief-A -dropper-.pdf
886 KiB
2014-02-17 - Hiding in plain sight- a story about a sneaky banking Trojan.pdf
1.9 MiB
2014-02-19 - XtremeRAT- Nuisance or Threat-.pdf
124 KiB
2014-02-21 - An In‑depth Analysis of Linux-Ebury.pdf
1.0 MiB
2014-02-21 - CVE 2014-0322 Malware - Sakurel (Feb 21, 2014).pdf
144 KiB
2014-02-24 - The Art of Attribution Identifying and Pursuing your Cyber Adversaries.pdf
2.2 MiB
2014-02-28 - Uroburos - highly complex espionage software with Russian roots.pdf
141 KiB
2014-03-05 - Android RATs Branch out with Dendroid.pdf
257 KiB
2014-03-06 - Dexter, Project Hook POS Malware Campaigns Persist.pdf
118 KiB
2014-03-06 - The Siesta Campaign- A New Targeted Attack Awakens.pdf
173 KiB
2014-03-07 - Uroburos – Deeper travel into kernel protection mitigation.pdf
137 KiB
2014-03-12 - A Detailed Examination of the Siesta Campaign.pdf
102 KiB
2014-03-12 - Agent.btz- a Source of Inspiration-.pdf
339 KiB
2014-03-12 - Uroburos the Snake Rootkit.pdf
866 KiB
2014-03-18 - Operation Windigo – the vivisection of a large Linux server‑side credential‑stealing malware campaign.pdf
716 KiB
2014-03-18 - Windigo Linux Analysis – Ebury and Cdorked.pdf
156 KiB
2014-03-25 - Spear Phishing the News Cycle- APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370.pdf
688 KiB
2014-04-02 - Tofsee botnet.pdf
3.1 MiB
2014-04-09 - BackDoor.Gootkit.112—a new multi-purpose backdoor.pdf
744 KiB
2014-04-15 - Trojan banking.pdf
187 KiB
2014-04-17 - A quick analysis of the latest Shadow Brokers dump.pdf
3.0 MiB
2014-04-18 - TROJ64_WOWLIK.VT.pdf
92 KiB
2014-04-21 - Hacking Team.pdf
307 KiB
2014-04-27 - Analysis of the Predator Pain Keylogger.pdf
1.2 MiB
2014-05-06 - Rovnix new “evolution”.pdf
271 KiB
2014-05-13 - Cat Scratch Fever- CrowdStrike Tracks Newly Reported Iranian Actor as FLYING KITTEN.pdf
1.1 MiB
2014-05-13 - Uroburos rootkit- Belgian Foreign Ministry stricken.pdf
101 KiB
2014-05-15 - DDoS Trojans attack Linux.pdf
158 KiB
2014-05-16 - APT Campaign Leverages the Cueisfry Trojan and Microsoft Word Vulnerability CVE-2014-1761.pdf
104 KiB
2014-05-19 - 5 in China Army Face U.S. Charges of Cyberattacks.pdf
529 KiB
2014-05-22 - Meet the Zberp Trojan.pdf
712 KiB
2014-05-29 - Iranian hackers sucker punch U.S. defense officials with creative social-media scam.pdf
156 KiB
2014-05-30 - Taking off the Blackshades.pdf
1.4 MiB
2014-06-02 - Analysis of Uroburos, using WinDbg.pdf
379 KiB
2014-06-02 - Molerats, Here for Spring!.pdf
2.3 MiB
2014-06-02 - Sinowal banking trojan.pdf
3.4 MiB
2014-06-04 - Introducing Antak - A webshell which utilizes powershell.pdf
1.1 MiB
2014-06-09 - ZeuS.Maple Variant Targets Canadian Online Banking Customers.pdf
2.4 MiB
2014-06-10 - Clandestine Fox, Part Deux.pdf
116 KiB
2014-06-18 - Neutrino Bot (aka MS-Win32-Kasidet).pdf
125 KiB
2014-06-23 - Havex Hunts For ICS-SCADA Systems.pdf
136 KiB
2014-07-02 - KIVARS With Venom- Targeted Attacks Upgrade with 64-bit “Support”.pdf
2.7 MiB
2014-07-07 - Deep in Thought- Chinese Targeting of National Security Think Tanks.pdf
130 KiB
2014-07-07 - Disect Android APKs like a Pro - Static code analysis.pdf
1.2 MiB
2014-07-08 - Security Matters - Cyberespionage Campaign Hits Energy Companies.pdf
5.0 MiB
2014-07-09 - BrutPOS- RDP Bruteforcing Botnet Targeting POS Systems.pdf
867 KiB
2014-07-10 - Versatile DDoS Trojan for Linux.pdf
1.4 MiB
2014-07-11 - The Father of Zeus- Kronos Malware Discovered.pdf
1.5 MiB
2014-07-15 - Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities.pdf
1.9 MiB
2014-07-15 - Unit 42 Technical Analysis- Seaduke.pdf
310 KiB
2014-07-16 - Mini Analysis of the TinyBanker Tinba.pdf
885 KiB
2014-07-18 - Bird's nest.pdf
230 KiB
2014-07-31 - Poweliks- the persistent malware without a file.pdf
212 KiB
2014-07-31 - Spy of the Tiger.pdf
540 KiB
2014-08-04 - New Release- Decrypting NetWire C2 Traffic.pdf
118 KiB
2014-08-07 - Innaput Actors Utilize Remote Access Trojan Since 2016, Presumably Targeting Victim Files.pdf
362 KiB
2014-08-07 - Malware Analysis of the Lurk Downloader.pdf
368 KiB
2014-08-07 - Sophisticated 'Turla' hackers spying on European governments, say researchers.pdf
1.7 MiB
2014-08-07 - The Epic Turla Operation.pdf
4.5 MiB
2014-08-11 - mht, MS12-27 and malware .info.pdf
177 KiB
2014-08-14 - Hunting the Mutex.pdf
108 KiB
2014-08-19 - APT Gang Branches Out to Medical Espionage in Community Health Breach.pdf
208 KiB
2014-08-20 - “El Machete”.pdf
1.4 MiB
2014-08-24 - Another country-sponsored #malware- Vietnam APT Campaign.pdf
1.2 MiB
2014-08-24 - Another country-sponsored malware- Vietnam APT Campaign.pdf
1.2 MiB
2014-08-27 - NetTraveler Gets a Makeover for 10th Anniversary.pdf
117 KiB
2014-08-28 - BIFROSE Now More Evasive Through Tor, Used for Targeted Attack.pdf
2.7 MiB
2014-08-28 - Scanbox- A Reconnaissance Framework Used with Watering Hole Attacks.pdf
1.3 MiB
2014-08-29 - Connecting the Dots- Syrian Malware Team Uses BlackWorm for Attacks.pdf
2.0 MiB
2014-08-29 - New BlackPOS Malware Emerges in the Wild, Targets Retail Accounts.pdf
2.7 MiB
2014-08-29 - Sinkholing the Backoff POS Trojan.pdf
277 KiB
2014-08-31 - Introduction to the ZeroLocker ransomware.pdf
928 KiB
2014-09-03 - ALDIBOT.pdf
72 KiB
2014-09-03 - Darwin’s Favorite APT Group.pdf
102 KiB
2014-09-04 - PITOU- The -silent- resurrection of the notorious Srizbi kernel spambot.pdf
32 KiB
2014-09-11 - TorrentLocker Ransomware Cracked and Decrypter has been made.pdf
318 KiB
2014-09-19 - Malware microevolution.pdf
55 KiB
2014-09-19 - Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy.pdf
99 KiB
2014-09-21 - Reversing Tinba- World's smallest trojan-banker DGA Code.pdf
103 KiB
2014-09-22 - Tinba Malware Reloaded and Attacking Banks Around the World.pdf
1.6 MiB
2014-09-23 - Android malware based on SMS encryption and with KitKat support.pdf
174 KiB
2014-09-23 - MALWARE-CNC Win.Trojan.Aytoke variant outbound connection.pdf
51 KiB
2014-09-29 - MMD-0028-2014 - Linux-XOR.DDoS- Fuzzy reversing a new China ELF.pdf
1.3 MiB
2014-10-02 - Occupy Central- The Umbrella Revolution and Chinese Intelligence.pdf
607 KiB
2014-10-03 - New Indicators of Compromise for APT Group Nitro Uncovered.pdf
102 KiB
2014-10-05 - Dissecting SmokeLoader (or Yulia's sweet ass proposition).pdf
647 KiB
2014-10-06 - Data Theft in Aisle 9- A FireEye Look at Threats to Retailers.pdf
79 KiB
2014-10-14 - CrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda.pdf
1.1 MiB
2014-10-14 - CVE‑2014‑4114- Details on August BlackEnergy PowerPoint Campaigns.pdf
273 KiB
2014-10-14 - Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks.pdf
281 KiB
2014-10-14 - Security vendors take action against Hidden Lynx malware.pdf
142 KiB
2014-10-15 - Operation Windigo- “Good job, ESET!” says malware author.pdf
252 KiB
2014-10-20 - OrcaRAT - A whale of a tale.pdf
55 KiB
2014-10-27 - Full Disclosure of Havex Trojans.pdf
336 KiB
2014-10-27 - ScanBox framework – who’s affected, and who’s using it-.pdf
55 KiB
2014-10-30 - COM Object hijacking- the discreet way of persistence.pdf
333 KiB
2014-11-03 - BE2 custom plugins, router abuse, and target profiles.pdf
1.5 MiB
2014-11-10 - The Darkhotel APT.pdf
207 KiB
2014-11-10 - Thoughts on Absolute Computrace.pdf
735 KiB
2014-11-10 - Timeline of Sandworm Attacks.pdf
980 KiB
2014-11-11 - The Uroburos case- new sophisticated RAT identified.pdf
126 KiB
2014-11-12 - Korplug military targeted attacks- Afghanistan & Tajikistan.pdf
338 KiB
2014-11-13 - BASHLITE Affects Devices Running on BusyBox.pdf
168 KiB
2014-11-13 - Chinese hackers 'breach Australian media organisations' ahead of G20.pdf
189 KiB
2014-11-14 - OnionDuke- APT Attacks Via the Tor Network.pdf
299 KiB
2014-11-15 - OnionDuke samples.pdf
379 KiB
2014-11-19 - ROVNIX Infects Systems with Password-Protected Macros.pdf
2.7 MiB
2014-11-21 - Operation Double Tap.pdf
97 KiB
2014-11-24 - I am Ironman- DEEP PANDA Uses Sakula Malware to Target Organizations in Multiple Sectors.pdf
1.1 MiB
2014-11-24 - Regin- nation-state ownage of GSM networks.pdf
1.4 MiB
2014-11-25 - Curious Korlia.pdf
348 KiB
2014-11-25 - Regin APT Attacks Among the Most Sophisticated Ever Analyzed.pdf
2.5 MiB
2014-11-26 - Getmypass Point of Sale Malware.pdf
307 KiB
2014-11-26 - TR-23 Analysis - NetWiredRC malware.pdf
113 KiB
2014-11-27 - New PoS Malware Kicks off Holiday Shopping Weekend.pdf
2.7 MiB
2014-11-30 - W32-HiAsm.A!tr.pdf
59 KiB
2014-12-08 - The Hack of Sony Pictures- What We Know and What You Need to Know.pdf
362 KiB
2014-12-08 - The ‘Penquin’ Turla.pdf
546 KiB
2014-12-09 - Blue Coat Exposes “The Inception Framework”; Very Sophisticated, Layered Malware Attack Targeted at Military, Diplomats, and Bus.pdf
68 KiB
2014-12-09 - Blue Coat Exposes “The Inception Framework”; Very Sophisticated, Layered Malware Attack Targeted at Military, Diplomats, and Business Execs.pdf
675 KiB
2014-12-09 - Linux Modules Connected to Turla APT Discovered.pdf
105 KiB
2014-12-10 - Cloud Atlas- RedOctober APT is back in style.pdf
817 KiB
2014-12-11 - The Evolution of Point-of-Sale (PoS) Malware.pdf
470 KiB
2014-12-15 - Banatrix – an indepth look.pdf
139 KiB
2014-12-16 - EvilBunny- Malware Instrumented By Lua.pdf
240 KiB
2014-12-17 - Dyre Banking Trojan.pdf
555 KiB
2014-12-18 - Alina POS malware 'sparks' off a new variant.pdf
632 KiB
2014-12-18 - Chthonic- a new modification of ZeuS.pdf
1.2 MiB
2014-12-19 - Alert (TA14-353A)- Targeted Destructive Malware.pdf
95 KiB
2014-12-19 - The unrelenting evolution of Vawtrak.pdf
1.9 MiB
2014-12-21 - The DGA of Ramnit.pdf
261 KiB
2014-12-22 - Virlock- First Self‑Reproducing Ransomware is also a Shape Shifter.pdf
1.4 MiB