Date Author Title

ROOTKIT ZEROACCESS REVERSE ENGINEERING

2010-11-18Chris CarboniStopping the ZeroAccess Rootkit

ROOTKIT

2024-10-09/a>Xavier MertensFrom Perfctl to InfoStealer
2016-02-26/a>Xavier MertensQuick Audit of *NIX Systems
2013-02-21/a>Bojan ZdrnjaSSHD rootkit in the wild
2011-12-06/a>Pedro BuenoThe RedRet connection...
2011-11-22/a>Pedro BuenoUpdates on ZeroAccess and BlackHole front...
2011-07-02/a>Pedro BuenoBootkits, they are back at full speed...
2011-02-14/a>Richard PorterAnonymous Damage Control Anybody?
2010-11-18/a>Chris CarboniStopping the ZeroAccess Rootkit
2010-02-19/a>Mark HofmanMS10-015 may cause Windows XP to blue screen (but only if you have malware on it)
2008-05-25/a>Stephen HallCisco's Response to Rootkit presentation
2008-05-23/a>Mike PoorCisco IOS Rootkit thoughts

ZEROACCESS

2013-07-04/a>Russ McReeCelebrating 4th of July With a Malware PCAP Visualization
2011-11-22/a>Pedro BuenoUpdates on ZeroAccess and BlackHole front...
2010-11-18/a>Chris CarboniStopping the ZeroAccess Rootkit

REVERSE

2021-02-01/a>Rob VandenBrinkTaking a Shot at Reverse Shell Attacks, CNC Phone Home and Data Exfil from Servers
2018-06-29/a>Remco VerhoefCrypto community target of MacOS malware
2014-04-13/a>Kevin ShorttReverse Heartbleed Testing
2012-09-14/a>Lenny ZeltserAnalyzing Malicious RTF Files Using OfficeMalScanner's RTFScan
2012-06-04/a>Lenny ZeltserDecoding Common XOR Obfuscation in Malicious Code
2010-11-18/a>Chris CarboniStopping the ZeroAccess Rootkit
2010-02-13/a>Lorna HutchesonNetwork Traffic Analysis in Reverse

ENGINEERING

2017-07-16/a>Renato MarinhoSMS Phishing induces victims to photograph its own token card
2015-11-21/a>Didier StevensMaldoc Social Engineering Trick
2014-08-20/a>Kevin ShorttSocial Engineering Alive and Well
2013-07-08/a>Richard PorterWhy do we Click?
2012-09-14/a>Lenny ZeltserAnalyzing Malicious RTF Files Using OfficeMalScanner's RTFScan
2012-06-04/a>Lenny ZeltserDecoding Common XOR Obfuscation in Malicious Code
2011-05-10/a>Swa FrantzenChanging MO in scamming our users ?
2010-12-29/a>Daniel WesemannBeware of strange web sites bearing gifts ...
2010-11-18/a>Chris CarboniStopping the ZeroAccess Rootkit
2010-06-14/a>Manuel Humberto Santander PelaezNew way of social engineering on IRC
2010-05-02/a>Mari NicholsZbot Social Engineering
2010-04-29/a>Bojan ZdrnjaWho needs exploits when you have social engineering?
2010-04-13/a>Johannes UllrichMore Legal Threat Malware E-Mail
2009-06-01/a>G. N. WhiteYet another "Digital Certificate" malware campaign
2009-04-24/a>Pedro BuenoDid you check your conference goodies?
2009-01-18/a>Maarten Van HorenbeeckTargeted social engineering