/vx/Malware Analysis/2011/

58 directories 0 files
Name Size Modified
Go up
2011-01-09 - CVE-2010-3333 DOC with info theft trojan from the American Chamber of Commerce/
2011-01-20 - Beschreibung des Virus Backdoor.Win32. Buterat.afj/
2011-01-30 - GpCode Ransomware 2010 Simple Analysis/
2011-03-02 - TDL4 and Glupteba - Piggyback PiggyBugs/
2011-03-08 - Worm-Win32-Yimfoca.A/
2011-03-11 - Trojan.Koredos Comes with an Unwelcomed Surprise/
2011-03-28 - Microsoft Hunting Rustock Controllers/
2011-04-16 - Troj-Sasfis-O/
2011-04-19 - TDSS part 1- The x64 Dollar Question/
2011-04-20 - Stuxnet Under the Microscope/
2011-04-26 - SpyEye Targets Opera, Google Chrome Users/
2011-04-28 - Un observateur d’événements aveugle…/
2011-04-30 - BKA-Trojaner (Ransomware)/
2011-05-19 - Win32-Expiro/
2011-06-22 - Criminals gain control over Mac with BackDoor.Olyx/
2011-06-29 - Inside a Back Door Attack/
2011-07-06 - Cybercriminals switch from MBR to NTFS/
2011-07-08 - Trojan.Mayachok.2- анализ первого известного VBR-буткита/
2011-07-14 - Cycbot - Ready to Ride/
2011-07-26 - SpyEye Trojan defeating online banking defenses/
2011-07-28 - Trojan Tricks Victims Into Transferring Funds/
2011-08-02 - Operation Shady Rat/
2011-08-03 - HTran and the Advanced Persistent Threat/
2011-08-04 - Analysis of ngrBot/
2011-08-04 - Operation Shady RAT/
2011-08-24 - Ice IX, the first crimeware based on the leaked ZeuS sources/
2011-08-27 - Morto.A/
2011-08-28 - Windows Remote Desktop Worm -Morto- Spreading/
2011-08-29 - Aug 28 Morto - Tsclient - RDP worm with DDoS features/
2011-09-02 - ZeuS Gets Another Update/
2011-09-09 - BIOS Threat is Showing up Again!/
2011-09-09 - Stuxnet Malware Analysis Paper/
2011-09-09 - The RSA Hack/
2011-09-11 - SK Hack by an Advanced Persistent Threat/
2011-09-13 - Mebromi- the first BIOS rootkit in the wild/
2011-09-14 - Ice IX- not cool at all/
2011-09-14 - Malware burrows deep into computer BIOS to escape AV/
2011-09-19 - Mebromi BIOS rootkit affecting Award BIOS (aka -BMW- virus)/
2011-09-21 - Sept 21 Greedy Shylock - financial malware/
2011-09-22 - The LURID Downloader/
2011-09-27 - Debugging Injected Code with IDA Pro/
2011-10-06 - Sep 28 CVE-2010-3333 Manuscript with Taidoor (Trojan.Matryoshka by CyberESI)/
2011-10-06 - ZeuS-in-the-Mobile – Facts and Theories/
2011-10-07 - Rustock samples and analysis links. Rustock.C, E, I, J and other variants/
2011-10-08 - Possible Governmental Backdoor Found (-Case R2D2-)/
2011-10-12 - 1PHP Group/
2011-10-13 - A Detailed Analysis of an Advanced Persistent Threat Malware/
2011-10-14 - A Detailed Analysis of an Advanced Persistent Threat Malware/
2011-10-17 - W32-Yunsip!tr.pws/
2011-10-26 - Stuxnet and Duqu - The Evolution of Drivers/
2011-10-26 - Tsunami Backdoor Can Be Used for Denial of Service Attacks/
2011-10-31 - The Nitro Attacks - Stealing Secrets from the Chemical Industry/
2011-10-31 - The Significance of the -Nitro- Attacks/
2011-11-15 - The many faces of Gh0st Rat/
2011-12-08 - Palebot trojan harvests Palestinian online credentials/
2011-12-08 - The Sykipot Attacks/
2011-12-11 - Intro. To Reversing - W32Pinkslipbot/
2011-12-20 - Analyzing CVE-2011-4369 – Part One/