368:
person looks at on the site, the amount of time a person spends on a page and the time it takes a person to execute a transaction. Other indicators include IP address, such as if a person who normally logs in from the Miami area suddenly logs in from St. Petersburg, Russia. SpyEye works fast, and can automatically and quickly initiate a transaction much faster than an average person manually on the website. That's a key trigger for banks to block a transaction. So SpyEye's authors are now trying to mimic -- albeit in an automated way -- how a real person would navigate a website.
399:
injection to hide fraudulent transfers of money out of an account by displaying an inaccurate bank balance. Trusteer noticed that SpyEye also hides fraudulent transactions even after a person has logged out and logged back into their account. The latest feature is designed with the same goal of keeping users unaware of fraud. The next time users log into their bank accounts, SpyEye will check its records to see what fraudulent transactions were made with the account, then simply delete them from the Web page, said Amit Klein, Trusteer's CEO. The account balance is also altered.
143:, or card numbers, thereby giving hackers information that allows them to steal money without account holders ever noticing. It can save the user's false balance (with fraudulent transactions hidden) so that the next time the user logs in, the fraudulent transactions and real balance are not displayed in the user's browser (though the bank still sees the fraudulent transactions.)
367:
In its latest versions, SpyEye has been modified with new code designed to evade advanced systems banks have put in place to try and block fraudulent transactions, said Mickey Boodai, Trusteer's CEO. Banks are now analyzing how a person uses their site, looking at parameters such as how many pages a
398:
SpyEye is notable for its ability to inject new fields into a Web page, a technique called HTML injection, which can ask banking customers for sensitive information they normally would not be asked. The requested data can include logins and passwords or a debit card number. It can also use HTML
412:
132:
to steal user credentials for malicious use. SpyEye allows hackers to steal money from online bank accounts and initiate transactions even while valid users are logged into their bank account
217:
and rights to sell Zeus to his biggest competitor, the creator of the SpyEye trojan; those same experts warned the retirement was a ruse and expect the developer to return with new tricks.
897:
917:
226:, co-author of SpyEye, was arrested and also sentenced to prison for 15 years; both men were charged for stealing hundreds of millions of dollars from banks all around the world.
583:
1069:
609:
887:
831:
437:
135:
SpyEye has the ability to insert new fields and alter existing fields when a compromised user's browser displays a web page, allowing it to prompt for
256:
350:
877:
646:
1001:
1415:
882:
324:
1549:
1531:
1032:
810:
576:
1555:
1081:
1042:
677:
856:
1615:
1561:
1136:
1027:
963:
800:
702:
1022:
795:
488:
381:
220:
In 2016, Aleksandr
Andreevich Panin, author of SpyEye, was arrested and sentenced to nine years and six months in prison.
902:
614:
604:
569:
240:
1776:
1166:
953:
892:
851:
749:
201:
were the largest victims of SpyEye; the United States made up 97% of the institutions that fell victim of this malware.
1271:
1006:
769:
167:
1960:
1301:
1156:
948:
841:
785:
1441:
1410:
1037:
276:
300:
2057:
1579:
1146:
1064:
970:
943:
150:
in 2009 and was sold in underground forums for $ 500+ in which SpyEye advertised features such as keyloggers,
1735:
1399:
872:
805:
651:
514:
2052:
1609:
1465:
1296:
958:
1750:
1585:
1369:
733:
1513:
1394:
1106:
815:
764:
759:
171:
489:"Growth in Social Networking, Mobile and Infrastructure Attacks Threaten Corporate Security in 2011"
2012:
1884:
912:
728:
109:
2022:
2017:
1914:
1543:
1306:
1232:
922:
723:
261:
2027:
1909:
1879:
1483:
1339:
697:
661:
540:
304:
125:
121:
117:
48:
1955:
1807:
1730:
1379:
1316:
1191:
640:
223:
85:
1965:
1940:
1904:
1832:
1745:
1740:
1384:
1176:
1086:
790:
251:
1704:
1699:
1389:
1374:
1364:
1359:
1291:
1266:
1261:
1256:
1201:
656:
462:
271:
210:
186:
2046:
1827:
1286:
1245:
1241:
1237:
355:
245:
182:
129:
101:
52:
1771:
1725:
1525:
1489:
1344:
1334:
1227:
1222:
1217:
1091:
907:
836:
2007:
1997:
1945:
1853:
1797:
1709:
1658:
1519:
1349:
1076:
707:
214:
159:
1950:
1935:
1863:
1653:
1603:
1507:
1459:
1435:
1423:
1281:
1206:
1196:
1186:
1171:
1131:
1056:
687:
136:
1981:
1858:
1822:
1812:
1684:
1501:
1251:
1181:
1121:
682:
235:
163:
140:
1889:
1817:
1802:
1621:
1597:
1471:
1453:
1354:
1276:
1111:
1096:
996:
975:
754:
386:
151:
1919:
1792:
1755:
1689:
1668:
1638:
1591:
1573:
1495:
1429:
1211:
1126:
1116:
1101:
561:
113:
97:
74:
38:
2002:
1894:
1848:
1477:
1447:
1326:
1311:
1141:
980:
692:
266:
194:
190:
147:
105:
70:
1627:
1567:
1537:
846:
198:
155:
1899:
1694:
938:
565:
175:
878:
541:"Creators of SpyEye Virus Sentence to 24 Years in Prison"
463:"Top hacker "retires"; experts brace for his return"
1990:
1974:
1928:
1872:
1841:
1785:
1764:
1718:
1677:
1646:
1637:
1408:
1325:
1155:
1055:
1015:
989:
931:
865:
824:
778:
742:
716:
670:
633:
626:
80:
66:
58:
44:
34:
26:
21:
438:"Trend Micro Researchers Uncover SpyEye Operation"
382:"SpyEye Malware Borrows Zeus Trick to Mask Fraud"
351:"SpyEye Trojan defeating online banking defenses"
918:Russian interference in the 2016 U.S. elections
577:
8:
213:said that he was retiring and had given the
888:Democratic National Committee cyber attacks
301:"SpyEye Targets Opera, Google Chrome Users"
1643:
832:Office of Personnel Management data breach
630:
584:
570:
562:
294:
292:
288:
515:"SpyEye Makers Get 24 Years in Prison"
257:Timeline of computer viruses and worms
18:
487:Internet Identity (6 December 2010).
181:Target users and institutions in the
124:operating systems. This malware uses
7:
883:Commission on Elections data breach
209:It is believed that the creator of
100:program that attacks users running
14:
1043:Jeff Bezos phone hacking incident
436:Irinco, Bernadette (2011-09-14).
1616:Microarchitectural Data Sampling
852:Ukrainian Power Grid Cyberattack
760:Cyberterrorism attack of June 25
964:2017 Ukraine ransomware attacks
801:2014 JPMorgan Chase data breach
461:Diane Bartz (29 October 2010).
796:2014 celebrity nude photo leak
513:Krebs, Brian (20 April 2016).
1:
1033:Bulgarian revenue agency hack
811:Russian hacker password theft
241:Command and control (malware)
1167:Bangladesh Black Hat Hackers
643:(publication of 2009 events)
413:"SpyEye Bot versus Zeus Bot"
411:Coogan, Peter (2010-02-04).
84:Aleksandr Andreevich Panin,
1028:Baltimore ransomware attack
380:Kirk, Jeremy (2012-01-04).
349:Kirk, Jeremy (2011-07-26).
299:Krebs, Brian (2011-04-26).
2076:
1302:Tailored Access Operations
949:WannaCry ransomware attack
842:Ashley Madison data breach
786:Anthem medical data breach
703:PlayStation network outage
1038:WhatsApp snooping scandal
903:Indian Bank data breaches
597:
277:Zombie (computer science)
1580:Speculative Store Bypass
1147:Ukrainian Cyber Alliance
944:2017 Macron e-mail leaks
954:Westminster data breach
873:Bangladesh Bank robbery
816:2014 Yahoo! data breach
806:2014 Sony Pictures hack
765:2013 Yahoo! data breach
750:South Korea cyberattack
652:Operation Olympic Games
647:Australian cyberattacks
248:, the successor to ZeuS
1297:Syrian Electronic Army
1007:SingHealth data breach
770:Singapore cyberattacks
708:RSA SecurID compromise
417:Symantec Official Blog
325:"Trojan: Win32/Spyeye"
1586:Lazy FP state restore
1370:Kristoffer von Hassel
1023:Sri Lanka cyberattack
893:Vietnam Airport Hacks
734:Operation High Roller
154:credit card modules,
146:SpyEye emanated from
1532:Silent Bob is Silent
592:Hacking in the 2010s
1466:SS7 vulnerabilities
1002:Atlanta cyberattack
971:Equifax data breach
729:Stratfor email leak
678:Canadian government
657:Operation ShadowNet
539:Khandelwal, Swati.
1915:Petya and NotPetya
1544:ROCA vulnerability
1307:The Shadow Brokers
1233:Iranian Cyber Army
1159:persistent threats
959:Petya and NotPetya
923:2016 Bitfinex hack
898:DCCC cyber attacks
857:SWIFT banking hack
262:Tiny Banker Trojan
2040:
2039:
2036:
2035:
2028:ZeroAccess botnet
1340:Mustafa Al-Bassam
1107:New World Hackers
1070:associated events
1051:
1050:
847:VTech data breach
698:Operation AntiSec
662:Operation Payback
621:
620:
519:Krebs On Security
329:www.microsoft.com
305:Krebs on Security
205:Authors of SpyEye
126:keystroke logging
122:Microsoft Windows
118:Internet Explorer
91:
90:
2065:
1644:
1317:Yemen Cyber Army
641:Operation Aurora
631:
600:
599:
586:
579:
572:
563:
556:
555:
553:
551:
536:
530:
529:
527:
525:
510:
504:
503:
501:
499:
484:
478:
477:
475:
473:
458:
452:
451:
449:
448:
433:
427:
426:
424:
423:
408:
402:
401:
395:
394:
377:
371:
370:
364:
363:
346:
340:
339:
337:
336:
321:
315:
314:
312:
311:
296:
224:Hamza Bendelladj
166:), Zeus killer,
86:Hamza Bendelladj
19:
2075:
2074:
2068:
2067:
2066:
2064:
2063:
2062:
2058:Windows trojans
2043:
2042:
2041:
2032:
1986:
1970:
1924:
1868:
1837:
1781:
1760:
1714:
1673:
1633:
1413:
1411:vulnerabilities
1404:
1321:
1214:(confederation)
1177:Charming Kitten
1158:
1151:
1087:Goatse Security
1047:
1011:
985:
976:Deloitte breach
927:
913:Dyn cyberattack
861:
820:
791:Operation Tovar
774:
738:
712:
666:
627:Major incidents
622:
593:
590:
560:
559:
549:
547:
545:The Hacker News
538:
537:
533:
523:
521:
512:
511:
507:
497:
495:
486:
485:
481:
471:
469:
460:
459:
455:
446:
444:
435:
434:
430:
421:
419:
410:
409:
405:
392:
390:
379:
378:
374:
361:
359:
348:
347:
343:
334:
332:
323:
322:
318:
309:
307:
298:
297:
290:
285:
252:Operation Tovar
232:
207:
17:
16:Malware program
12:
11:
5:
2073:
2072:
2069:
2061:
2060:
2055:
2045:
2044:
2038:
2037:
2034:
2033:
2031:
2030:
2025:
2020:
2015:
2010:
2005:
2000:
1994:
1992:
1988:
1987:
1985:
1984:
1978:
1976:
1972:
1971:
1969:
1968:
1963:
1958:
1953:
1948:
1943:
1938:
1932:
1930:
1926:
1925:
1923:
1922:
1917:
1912:
1907:
1902:
1897:
1892:
1887:
1882:
1876:
1874:
1870:
1869:
1867:
1866:
1861:
1856:
1851:
1845:
1843:
1839:
1838:
1836:
1835:
1830:
1825:
1820:
1815:
1810:
1805:
1800:
1798:Black Energy 3
1795:
1789:
1787:
1783:
1782:
1780:
1779:
1774:
1768:
1766:
1762:
1761:
1759:
1758:
1753:
1748:
1743:
1738:
1733:
1728:
1722:
1720:
1716:
1715:
1713:
1712:
1707:
1705:Metulji botnet
1702:
1697:
1692:
1687:
1681:
1679:
1675:
1674:
1672:
1671:
1666:
1661:
1659:Black Energy 2
1656:
1650:
1648:
1641:
1635:
1634:
1632:
1631:
1625:
1619:
1613:
1607:
1601:
1595:
1589:
1583:
1577:
1571:
1565:
1559:
1553:
1547:
1541:
1535:
1529:
1523:
1517:
1514:Broadcom Wi-Fi
1511:
1505:
1499:
1493:
1487:
1481:
1475:
1469:
1463:
1457:
1451:
1445:
1439:
1433:
1427:
1420:
1418:
1406:
1405:
1403:
1402:
1397:
1392:
1387:
1382:
1377:
1375:Junaid Hussain
1372:
1367:
1365:Jeremy Hammond
1362:
1360:Elliott Gunton
1357:
1352:
1347:
1342:
1337:
1331:
1329:
1323:
1322:
1320:
1319:
1314:
1309:
1304:
1299:
1294:
1292:Stealth Falcon
1289:
1284:
1279:
1274:
1269:
1267:PLA Unit 61486
1264:
1262:PLA Unit 61398
1259:
1257:Numbered Panda
1254:
1249:
1235:
1230:
1225:
1220:
1215:
1209:
1204:
1202:Equation Group
1199:
1194:
1189:
1184:
1179:
1174:
1169:
1163:
1161:
1153:
1152:
1150:
1149:
1144:
1139:
1134:
1129:
1124:
1119:
1114:
1109:
1104:
1099:
1094:
1089:
1084:
1079:
1074:
1073:
1072:
1061:
1059:
1053:
1052:
1049:
1048:
1046:
1045:
1040:
1035:
1030:
1025:
1019:
1017:
1013:
1012:
1010:
1009:
1004:
999:
993:
991:
987:
986:
984:
983:
978:
973:
968:
967:
966:
956:
951:
946:
941:
935:
933:
929:
928:
926:
925:
920:
915:
910:
905:
900:
895:
890:
885:
880:
875:
869:
867:
863:
862:
860:
859:
854:
849:
844:
839:
834:
828:
826:
822:
821:
819:
818:
813:
808:
803:
798:
793:
788:
782:
780:
776:
775:
773:
772:
767:
762:
757:
752:
746:
744:
740:
739:
737:
736:
731:
726:
720:
718:
714:
713:
711:
710:
705:
700:
695:
693:HBGary Federal
690:
685:
680:
674:
672:
668:
667:
665:
664:
659:
654:
649:
644:
637:
635:
628:
624:
623:
619:
618:
612:
607:
598:
595:
594:
591:
589:
588:
581:
574:
566:
558:
557:
531:
505:
493:Yahoo! Finance
479:
453:
428:
403:
372:
341:
316:
287:
286:
284:
281:
280:
279:
274:
272:Zeus (malware)
269:
264:
259:
254:
249:
243:
238:
231:
228:
206:
203:
187:United Kingdom
89:
88:
82:
78:
77:
68:
64:
63:
60:
56:
55:
46:
42:
41:
36:
32:
31:
28:
27:Technical name
24:
23:
15:
13:
10:
9:
6:
4:
3:
2:
2071:
2070:
2059:
2056:
2054:
2053:Trojan horses
2051:
2050:
2048:
2029:
2026:
2024:
2021:
2019:
2016:
2014:
2011:
2009:
2006:
2004:
2001:
1999:
1996:
1995:
1993:
1989:
1983:
1980:
1979:
1977:
1973:
1967:
1964:
1962:
1959:
1957:
1954:
1952:
1949:
1947:
1944:
1942:
1939:
1937:
1934:
1933:
1931:
1927:
1921:
1918:
1916:
1913:
1911:
1908:
1906:
1903:
1901:
1898:
1896:
1893:
1891:
1888:
1886:
1883:
1881:
1878:
1877:
1875:
1871:
1865:
1862:
1860:
1857:
1855:
1852:
1850:
1847:
1846:
1844:
1840:
1834:
1831:
1829:
1828:Gameover ZeuS
1826:
1824:
1821:
1819:
1816:
1814:
1811:
1809:
1806:
1804:
1801:
1799:
1796:
1794:
1791:
1790:
1788:
1784:
1778:
1775:
1773:
1770:
1769:
1767:
1763:
1757:
1754:
1752:
1749:
1747:
1744:
1742:
1739:
1737:
1734:
1732:
1729:
1727:
1724:
1723:
1721:
1717:
1711:
1708:
1706:
1703:
1701:
1698:
1696:
1693:
1691:
1688:
1686:
1683:
1682:
1680:
1676:
1670:
1667:
1665:
1662:
1660:
1657:
1655:
1652:
1651:
1649:
1645:
1642:
1640:
1636:
1629:
1626:
1623:
1620:
1617:
1614:
1611:
1608:
1605:
1602:
1599:
1596:
1593:
1590:
1587:
1584:
1581:
1578:
1575:
1572:
1569:
1566:
1563:
1560:
1557:
1554:
1551:
1548:
1545:
1542:
1539:
1536:
1533:
1530:
1527:
1524:
1521:
1518:
1515:
1512:
1509:
1506:
1503:
1500:
1497:
1494:
1491:
1488:
1485:
1482:
1479:
1476:
1473:
1470:
1467:
1464:
1461:
1458:
1455:
1452:
1449:
1446:
1443:
1440:
1437:
1434:
1431:
1428:
1425:
1422:
1421:
1419:
1417:
1412:
1407:
1401:
1398:
1396:
1393:
1391:
1388:
1386:
1383:
1381:
1378:
1376:
1373:
1371:
1368:
1366:
1363:
1361:
1358:
1356:
1353:
1351:
1348:
1346:
1343:
1341:
1338:
1336:
1333:
1332:
1330:
1328:
1324:
1318:
1315:
1313:
1310:
1308:
1305:
1303:
1300:
1298:
1295:
1293:
1290:
1288:
1287:Rocket Kitten
1285:
1283:
1280:
1278:
1275:
1273:
1270:
1268:
1265:
1263:
1260:
1258:
1255:
1253:
1250:
1247:
1243:
1239:
1238:Lazarus Group
1236:
1234:
1231:
1229:
1226:
1224:
1221:
1219:
1216:
1213:
1210:
1208:
1205:
1203:
1200:
1198:
1195:
1193:
1190:
1188:
1185:
1183:
1180:
1178:
1175:
1173:
1170:
1168:
1165:
1164:
1162:
1160:
1154:
1148:
1145:
1143:
1140:
1138:
1135:
1133:
1130:
1128:
1125:
1123:
1120:
1118:
1115:
1113:
1110:
1108:
1105:
1103:
1100:
1098:
1095:
1093:
1090:
1088:
1085:
1083:
1080:
1078:
1075:
1071:
1068:
1067:
1066:
1063:
1062:
1060:
1058:
1054:
1044:
1041:
1039:
1036:
1034:
1031:
1029:
1026:
1024:
1021:
1020:
1018:
1014:
1008:
1005:
1003:
1000:
998:
995:
994:
992:
988:
982:
981:Disqus breach
979:
977:
974:
972:
969:
965:
962:
961:
960:
957:
955:
952:
950:
947:
945:
942:
940:
937:
936:
934:
930:
924:
921:
919:
916:
914:
911:
909:
906:
904:
901:
899:
896:
894:
891:
889:
886:
884:
881:
879:
876:
874:
871:
870:
868:
864:
858:
855:
853:
850:
848:
845:
843:
840:
838:
835:
833:
830:
829:
827:
823:
817:
814:
812:
809:
807:
804:
802:
799:
797:
794:
792:
789:
787:
784:
783:
781:
777:
771:
768:
766:
763:
761:
758:
756:
755:Snapchat hack
753:
751:
748:
747:
745:
741:
735:
732:
730:
727:
725:
724:LinkedIn hack
722:
721:
719:
715:
709:
706:
704:
701:
699:
696:
694:
691:
689:
686:
684:
681:
679:
676:
675:
673:
669:
663:
660:
658:
655:
653:
650:
648:
645:
642:
639:
638:
636:
632:
629:
625:
617: →
616:
613:
611:
608:
606:
603:←
602:
601:
596:
587:
582:
580:
575:
573:
568:
567:
564:
546:
542:
535:
532:
520:
516:
509:
506:
494:
490:
483:
480:
468:
464:
457:
454:
443:
439:
432:
429:
418:
414:
407:
404:
400:
389:
388:
383:
376:
373:
369:
358:
357:
356:Computerworld
352:
345:
342:
330:
326:
320:
317:
306:
302:
295:
293:
289:
282:
278:
275:
273:
270:
268:
265:
263:
260:
258:
255:
253:
250:
247:
246:Gameover ZeuS
244:
242:
239:
237:
234:
233:
229:
227:
225:
221:
218:
216:
212:
204:
202:
200:
196:
192:
188:
184:
183:United States
179:
177:
174:grabbers and
173:
169:
165:
161:
157:
153:
149:
144:
142:
138:
133:
131:
130:form grabbing
127:
123:
119:
115:
111:
107:
103:
102:Google Chrome
99:
95:
87:
83:
79:
76:
72:
69:
65:
61:
57:
54:
50:
47:
43:
40:
37:
33:
29:
25:
20:
1772:CryptoLocker
1663:
1526:DoublePulsar
1345:Cyber Anakin
1335:Ryan Ackroyd
1228:Helix Kitten
1223:Hacking Team
1218:Guccifer 2.0
1092:Lizard Squad
908:Surkov leaks
837:Hacking Team
548:. Retrieved
544:
534:
522:. Retrieved
518:
508:
496:. Retrieved
492:
482:
470:. Retrieved
466:
456:
445:. Retrieved
441:
431:
420:. Retrieved
416:
406:
397:
391:. Retrieved
385:
375:
366:
360:. Retrieved
354:
344:
333:. Retrieved
331:. 2011-06-14
328:
319:
308:. Retrieved
222:
219:
208:
180:
160:config files
145:
134:
93:
92:
53:form grabber
2008:NetTraveler
1946:LogicLocker
1854:Hidden Tear
1751:Red October
1610:Dragonblood
1520:EternalBlue
1484:Stagefright
1350:George Hotz
1327:Individuals
1077:CyberBerkut
498:16 December
472:16 December
442:Trend Micro
215:source code
2047:Categories
1951:Rensenware
1936:BrickerBot
1864:TeslaCrypt
1654:Bad Rabbit
1604:Foreshadow
1508:Cloudbleed
1460:Row hammer
1442:Shellshock
1436:Heartbleed
1424:Evercookie
1400:The Jester
1282:Red Apollo
1242:BlueNorOff
1212:GOSSIPGIRL
1207:Fancy Bear
1197:Elfin Team
1192:DarkMatter
1187:Dark Basin
1172:Bureau 121
1132:Teamp0ison
1057:Hacktivism
688:DNSChanger
447:2020-07-09
422:2020-07-09
393:2020-07-09
362:2020-07-09
335:2020-07-09
310:2020-07-09
283:References
178:grabbers.
137:user names
1982:VPNFilter
1859:Rombertik
1823:FinFisher
1813:DarkHotel
1777:DarkSeoul
1685:Coreflood
1550:BlueBorne
1502:Dirty COW
1416:disclosed
1414:publicly
1252:NSO Group
1182:Cozy Bear
1122:PayPal 14
1065:Anonymous
939:SHAttered
683:DigiNotar
236:Conficker
164:encrypted
158:backups,
152:auto-fill
141:passwords
49:keylogger
2023:Titanium
1966:XafeCopy
1961:WannaCry
1890:KeRanger
1818:Duqu 2.0
1803:Carbanak
1622:BlueKeep
1598:SigSpoof
1556:Meltdown
1472:WinShock
1454:Rootpipe
1355:Guccifer
1277:Pranknet
1272:PLATINUM
1246:AndAriel
1157:Advanced
1112:NullCrew
1097:LulzRaft
997:Trustico
610:Timeline
524:23 March
387:PC World
230:See also
170:access,
1920:X-Agent
1910:Pegasus
1793:Brambul
1756:Shamoon
1700:Kelihos
1690:Alureon
1669:Stuxnet
1639:Malware
1592:TLBleed
1574:Exactis
1562:Spectre
1496:Badlock
1430:iSeeYou
1395:Topiary
1127:RedHack
1117:OurMine
1102:LulzSec
550:20 June
467:Reuters
114:Firefox
98:malware
81:Authors
75:Algeria
45:Subtype
39:Spyware
2003:Joanap
1956:Triton
1895:Necurs
1885:Jigsaw
1880:Hitler
1849:Dridex
1808:Careto
1731:Dexter
1664:SpyEye
1630:(2019)
1624:(2019)
1618:(2019)
1612:(2019)
1606:(2018)
1600:(2018)
1594:(2018)
1588:(2018)
1582:(2018)
1576:(2018)
1570:(2018)
1564:(2018)
1558:(2018)
1552:(2017)
1546:(2017)
1540:(2017)
1534:(2017)
1528:(2017)
1522:(2017)
1516:(2017)
1510:(2017)
1504:(2016)
1498:(2016)
1492:(2016)
1486:(2015)
1480:(2015)
1478:JASBUG
1474:(2014)
1468:(2014)
1462:(2014)
1456:(2014)
1450:(2014)
1448:POODLE
1444:(2014)
1438:(2014)
1432:(2013)
1426:(2010)
1409:Major
1390:Track2
1312:xDedic
1142:UGNazi
267:Torpig
195:Canada
191:Mexico
148:Russia
106:Safari
94:SpyEye
71:Russia
67:Origin
59:Family
30:SpyEye
22:SpyEye
2018:Tinba
1905:Mirai
1833:Regin
1746:Mahdi
1741:Flame
1726:Carna
1710:Stars
1628:Kr00k
1568:EFAIL
1538:KRACK
1490:DROWN
615:2020s
605:2000s
199:India
156:email
110:Opera
96:is a
2013:R2D2
1998:Grum
1991:2019
1975:2018
1941:Kirk
1929:2017
1900:MEMZ
1873:2016
1842:2015
1786:2014
1765:2013
1719:2012
1695:Duqu
1678:2011
1647:2010
1385:Sabu
1137:TDO
1082:GNAA
1016:2019
990:2018
932:2017
866:2016
825:2015
779:2014
743:2013
717:2012
671:2011
634:2010
552:2017
526:2017
500:2010
474:2010
211:Zeus
197:and
172:POP3
168:HTTP
128:and
116:and
62:Pubg
35:Type
1736:FBI
1380:MLT
1244:) (
176:FTP
120:on
2049::
543:.
517:.
491:.
465:.
440:.
415:.
396:.
384:.
365:.
353:.
327:.
303:.
291:^
193:,
189:,
185:,
139:,
112:,
108:,
104:,
73:,
51:,
1248:)
1240:(
585:e
578:t
571:v
554:.
528:.
502:.
476:.
450:.
425:.
338:.
313:.
162:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.