Securelist – Kaspersky Lab’s cyberthreat research and reports
English
  • English
  • Pусский
  • Deutsch
  • Français
  • Italiano
  • Español
  • Polski
  • Threats
    • Detected Objects
    • Spam and Phishing
    • Vulnerabilities and Hackers
    • Internal Threats
  • Categories
    • Research
    • APT reports
    • Mobile threats
    • Incidents
    • Security Bulletin
    • Spam and phishing
    • Publications
    • Malware reports
    • Opinion
    • All categories
  • Tags
    • APT
    • Botnets
    • Cyber espionage
    • Cyber weapon
    • Internet Banking
    • Mobile Malware
    • Social Engineering
    • Social networks
    • Targeted Attacks
    • Show all tags
  • Encyclopedia
  • Statistics
  • Descriptions
Menu
  • Threats
    • Detected Objects
    • Spam and Phishing
    • Vulnerabilities and Hackers
    • Internal Threats
  • Categories
    • Research
    • APT reports
    • Mobile threats
    • Incidents
    • Security Bulletin
    • Spam and phishing
    • Publications
    • Malware reports
    • Opinion
    • All categories
  • Tags
    • APT
    • Botnets
    • Cyber espionage
    • Cyber weapon
    • Internet Banking
    • Mobile Malware
    • Social Engineering
    • Social networks
    • Targeted Attacks
    • Show all tags
  • Encyclopedia
  • Statistics
  • Descriptions

Securelist Archive / Analysis

Tag: Zafi

no-image
Virus Watch

Patriot on the loose

December 14, 2004, 8:42 pm.
Costin Raiu

Zafi.d email worm spreading fast Read Full Article

no-image
Malware reports

Malware Evolution: October Roundup

November 25, 2004, 9:41 pm.
Pavel Zelensky

A brief overview of the evolution of malicious code in October 2004. Read Full Article

no-image
Virus Watch

New Zafi, New cyberwar?

October 27, 2004, 4:01 pm.
Alexander Gostev

New Zafi.c – author joins cyberwar Read Full Article

no-image
Malware reports

Malware evolution: June Roundup

July 11, 2004, 6:22 pm.
Pavel Zelensky

This month’s analysis of trends in malware evolution, from the Kaspersky Labs Virus Laboratory Read Full Article

  • Categories
  • Date
  • Tags
  • Author
  • APT reports
  • Archive
  • DDoS reports
  • Events
  • Incidents
  • Industrial threats
  • Internal Threats Reports
  • Kaspersky Security Bulletin
  • Malware reports
  • Mobile threats
  • News archive
  • Opinion
  • Publications
  • Research
  • SAS
  • Security technologies
  • Software
  • Spam and phishing
  • Spam and phishing reports
  • Virus Watch
  • Webcasts
<
  • 2018

    • Jan
    • Feb
    • Mar
    • Apr
  • 2017

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2016

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2015

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2014

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2013

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2012

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2011

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2010

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2009

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2008

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2007

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2006

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2005

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2004

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2003

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Sep
    • Oct
    • Nov
    • Dec
  • 2002

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
  • 2001

    • Feb
    • Apr
    • Jun
    • Jul
    • Aug
    • Dec
>
  • HOT
  • A .. G
  • H .. N
  • O .. U
  • V .. Z
  • 0 .. 9
  • AES-256
  • Audiocapture
  • Banloader
  • Base64
  • Biometric authentication
  • Bitcoins
  • Comparative Tests
  • DBIR APT
  • Desktop
  • Destructive attackers
  • Detected Objects
  • DNS Amplification
  • Dropbox
  • Espionage
  • Excel
  • Google glass
  • JAR
  • Mcrosoft Office
  • Methods of authentication
  • No More Ransom
  • OS X
  • PAC
  • PlugX
  • Python
  • Qt
  • RaaS
  • Remsec
  • Screenshot
  • Surveillance
  • TLD
  • Adobe
  • Adobe Flash
  • Adobe PDF
  • advertisement
  • Adware
  • AES-256
  • Amazon
  • AMD
  • Android
  • Animal Farm
  • Antivirus Technologies
  • Antivirus Testing
  • Antivirus Updates
  • Antivirus Vulnerabilities
  • Antiviruses
  • Apple
  • Apple iOS
  • Apple MacOS
  • Application Control
  • APT
  • APT criminal
  • Arabic Malware
  • ARM
  • AT&T
  • ATM
  • ATM attacks
  • Audiocapture
  • Backdoor
  • Backup
  • BadRabbit
  • Bagle
  • Banking Trojan
  • Banloader
  • Base64
  • Biometric authentication
  • BIOS
  • Bitcoin
  • Bitcoins
  • Bitscout
  • Blackberry
  • BlackEnergy
  • Bluetooth
  • Boleto
  • Bootkit
  • Boran
  • Botnets
  • Bozori
  • Brasil
  • Brazil
  • Browser Plugins
  • BSides
  • BTC
  • Buffer Overflows
  • Cabir
  • Campaigns
  • CAPTCHA
  • Carbanak
  • Certificate
  • Certificate authorities
  • Chronopay
  • CIL
  • Cloud
  • Cloud Computing
  • code injection
  • Comodo
  • Comparative Tests
  • Conferences
  • connected car
  • Content Filtering
  • Copyright
  • Corporative Threats
  • Credit Cards
  • Crimeware
  • Cross-platform malware
  • Crypto
  • Cryptocurrencies
  • cryptocurrency
  • CVE
  • Cyber espionage
  • Cyber War
  • Cyber weapon
  • Cybercrime
  • Cybercrime Legislation
  • Cyberespionage
  • Darknet
  • Data Encryption
  • Data leaks
  • Data loss
  • Data Protection
  • DBIR APT
  • DDoS-attacks
  • Deception techniques
  • Default Deny
  • Dell
  • Desktop
  • Destructive attackers
  • Detected Objects
  • Digital Certificates
  • DLL hijacking
  • DNS
  • DNS Amplification
  • DoS
  • drive-by attack
  • drivers
  • Dropbox
  • Dropper
  • Duqu
  • Duts
  • eBay
  • Electronic Payments
  • Email
  • Emotet
  • Encryption
  • Equation
  • Espionage
  • Excel
  • Exhibitions
  • ExPetr
  • Exploit Kits
  • Facebook
  • FakeCry
  • False Alarms
  • false positives
  • File Sharing
  • fileless malware
  • Financial malware
  • Firefox
  • Flame
  • Flashfake
  • Forecast
  • Forensic
  • Forensics
  • Fraud
  • Gaming Consoles
  • Gaming malware
  • Gauss
  • Google
  • Google Android
  • Google Chrome
  • Google glass
  • Gpcode
  • GSM
  • Gumblar
  • Hackers
  • Hackers Attacks
  • Hacking Team
  • HDD Rootkit
  • HDRoot
  • History of Malware
  • Hoaxes
  • honeypot
  • HTC
  • HTTPS
  • ICS
  • Identity Theft
  • Induc
  • Industrial control systems
  • industrial software
  • Industrial threats
  • Infected Files and Devices
  • infrastructure
  • Instant Messengers
  • Intel
  • Internal Threats Statistics
  • Internet Banking
  • Internet of Things
  • Internet Safety
  • IOActive
  • IOC
  • iOS
  • IoT
  • JAR
  • Java
  • JavaScript
  • Joint ventures
  • Json
  • Kaspersky Lab
  • Kaspersky Security Network (KSN)
  • KasperskyOS
  • Kelvir
  • Keylogger
  • Keyloggers
  • Kido
  • Koobface
  • Krotten
  • KSS
  • Law Enforcement
  • Lazarus
  • LdPinch
  • LinkedIn
  • Linux
  • Location-based services
  • LoveLetter
  • Machete
  • machine learning
  • Macros
  • Madi
  • Malicious spam
  • Malvertizing
  • Malware
  • Malware Classification
  • Malware Creators
  • malware description
  • Malware Descriptions
  • Malware Miscellany
  • Malware Statistics
  • Malware Technologies
  • marketplace
  • Mastercard
  • MBR
  • Mcrosoft Office
  • messengers
  • Methods of authentication
  • Microsoft
  • Microsoft ActiveX
  • Microsoft Internet Explorer
  • Microsoft Office
  • Microsoft Windows
  • Microsoft Word
  • Miner
  • Mirai
  • MITM
  • Mobile Attacks
  • mobile browser
  • Mobile Malware
  • Mobile security
  • Money theft
  • Motorola
  • Mozilla Foundation
  • MSIL
  • Mydoom
  • Mytob
  • Nation State Sponsored Espionage
  • Netsky
  • NetTraveler
  • NFC
  • Nigerian Scam
  • Nigerian Spam
  • No More Ransom
  • Non-Windows Malware
  • Novell
  • Numerology
  • Nyxem
  • Obfuscation
  • Offline Phishing
  • Onion
  • Online Games
  • open source
  • Oracle
  • OS X
  • OSX
  • P2P networks
  • PAC
  • Parental control
  • Passwords
  • Patch tuesday
  • Paypal
  • Petya
  • Phishing
  • PHP
  • Plugins
  • PlugX
  • Polymorphism
  • POS malware
  • PowerShell
  • Privacy
  • proactive protection
  • ProjectSauron
  • Proof-of-Concept
  • Public key infrastructure
  • Public transportation
  • PUPs
  • Python
  • QR code
  • Qt
  • RaaS
  • Ransomware
  • RAT Trojan
  • RDP
  • RedHat
  • Remsec
  • Reverse engineering
  • RFID
  • Rogue Security Solutions
  • Rooting Trojan
  • Rootkits
  • Router
  • RSA
  • Russian-speaking cybercrime
  • Safari
  • Sality
  • Santy
  • Sasser
  • Satellite
  • Scada
  • Scam
  • Screenshot
  • Script
  • Script Worms
  • Search Engines
  • Seculert
  • Secunia
  • secure OS
  • Security conference
  • Security Policies
  • Security technology
  • Security Websites
  • Shadow Brokers
  • Shamoon
  • Shellshock
  • Signed malware
  • Simda
  • Sinowal
  • Skype
  • Smart City
  • Smart home
  • SmartTV
  • SMS Trojan
  • Sober
  • Social Engineering
  • Social networks
  • Sofacy
  • Software
  • Sony
  • Spam
  • Spam and the law
  • Spam Letters
  • Spam report
  • Spam Statistics
  • Spammer techniques
  • Spear-Phishing
  • Spearphishing
  • SpyEye
  • Spyware
  • SSL
  • steganography
  • Stuxnet
  • Sun Java
  • SunOS / Solaris
  • supply-chain attack
  • Surveillance
  • Syria
  • Targeted attack
  • Targeted Attacks
  • TDSS
  • TeamXRat
  • Tematic Spam
  • TheSAS2016
  • TheSAS2017
  • TLD
  • Tools
  • TOR
  • Trainings
  • Trojan
  • Trojan-Bankers
  • Trojan-clicker
  • Trusted Environment
  • Turla
  • Twitter
  • Ubuntu
  • UEFI
  • USB-token
  • VBE
  • VBMania
  • Verisign
  • Verizon
  • Virtualization
  • Virus Writers Wars
  • Virut
  • VISA
  • VMWare
  • Vulnerabilities
  • Vulnerabilities and exploits
  • Vulnerabilities and Hackers
  • Vulnerability Statistics
  • WannaCry
  • WAP
  • Wardriving
  • Warezov
  • Watering hole attacks
  • Wearable devices
  • Weblogs
  • Website Hacks
  • WhatsApp
  • Whitelisting
  • Wi-Fi
  • Winamp
  • Windows
  • Windows 10
  • Windows Mobile
  • Winnti
  • Wiper
  • WireLurker
  • Worm
  • x64
  • XSS
  • Zafi
  • zero-day exploit
  • Zero-day vulnerabilities
  • ZeuS
  • Zhelatin
  • Ztorg
  • a .. g
  • h .. n
  • o .. u
  • v .. z
  • 0 .. 9
  • Alon, Noam
  • Alyushin, Victor
  • Amin Hasbini, Mohamad
  • Antukh, Alexander
  • Armstrong, Tim
  • Aseev, Eugene
  • Assolini, Fabio
  • Bakhmutov, Andrey
  • Bartholomew, Brian
  • Baumgartner, Kurt
  • Belov, Sergey
  • Berdnikov, Vasily
  • Bestuzhev, Dmitry
  • Bondarenko, Elena
  • Bronnikova, Daria
  • Brulez, Nicolas
  • Buchka, Nikita
  • Bulavas, Vladas
  • But, Andrey
  • Chebyshev, Victor
  • Coursen, Shane
  • Creus, Dani
  • Dashchenko, Vladimir
  • Davydov, Vasily
  • Demidova, Nadezhda
  • Denisov, Vitaly
  • Diaz, Vicente
  • Dolgushev, Andrey
  • Dolya, Alexey
  • Dovgopol, Roman
  • Dronov, Victor
  • Dumitru, Claudiu
  • Efremov, Andrey
  • Emelyanova, Olga
  • Emm, David
  • Eremin, Alexander
  • Fedotov, Nikolay
  • Firsh, Alexey
  • Funk, Christian
  • Galov, Dmitry
  • Garnaeva, Maria
  • Godwood, Ben
  • Goland, Dani
  • Golovanov, Sergey
  • Golovkin, Maxim
  • Gorchakov, Denis
  • Gorobets, Oleg
  • Gostev, Alexander
  • GReAT,
  • Grachev, Igor
  • Grebennikov, Nikolay
  • Gudilin, Oleg
  • Gudkova, Darya
  • Guerrero-Saade, Juan Andrés
  • Hioureas, Vasilios
  • Ibragimov, Timur
  • ICS CERT, Kaspersky Lab
  • Ignatiev, Konstantin
  • Ilganaev, Kirill
  • Ishimaru, Suguru
  • Ivanov, Anton
  • Jacoby, David
  • Janus, Marta
  • Kadiev, Alexei
  • Kalimanova, Katerina
  • Kalinin, Andrey
  • Kalkuhl, Magnus
  • Kamluk, Vitaly
  • Karasovsky, Dmitry
  • Kaspersky Lab,
  • Kazantsev, Anatoly
  • Khalimonenko, Alexander
  • Khudyakov, Andrey
  • Kivva, Anton
  • Kochetova, Olga
  • Kolesnikov, Alexander
  • Kollberg, Dirk
  • Kolotinsky, Evgeny
  • Komarov, Alexey
  • Kostin, Andrey
  • Kruglov, Kirill
  • Krylova, Evgeniya
  • Krylov, Vladimir
  • Kryukov, Andrey
  • Kulikova, Tatyana
  • Kupreev, Oleg
  • Kuskov, Evgeny
  • Kuskov, Vladimir
  • Kuzin, Mikhail
  • Kuzmenko, Roman
  • Ladikov, Andrey
  • Larin, Boris
  • Larkina, Anna
  • Legezo, Denis
  • Liskin, Alexander
  • Lopatin, Evgeny
  • Lozhkin, Sergey
  • Lurye, Sergey
  • Makhnutin, Andrey
  • Makrushin, Denis
  • Malanov, Alexey
  • Mamedov, Orkhan
  • Markov, Konstantin
  • Martinez, Roberto
  • Mashevsky, Yury
  • Maslennikov, Denis
  • Mieres, Jorge
  • Mineev, Sergey
  • Molsner, Michael
  • Monastyrsky, Alexey
  • Moore, Daniel
  • Muravitsky, Andrey
  • Namestnikova, Maria
  • Namestnikov, Yury
  • Naor, Ido
  • Naraine, Ryan
  • Nazarov, Denis
  • Nikishin, Andrey
  • Novikov, Sergey
  • Olsen, Bo
  • Onishchenko, Alexander
  • Ortloff, Stefan
  • Ortolani, Stefano
  • Osipov, Alexey
  • Parinov, Denis
  • Parys, Bart
  • Pintiysky, Vladislav
  • Pomerantsev, Ilya
  • Pontiroli, Santiago
  • Preuss, Marco
  • Prokhorenko, Mikhail
  • Rid, Thomas
  • Rosén, Frans
  • Rubinstein, Maria
  • Rubin, Andrey
  • Rudina, Ekaterina
  • Rusakov, Vyacheslav
  • Saad, Ghareeb
  • Sako, Roland
  • Samekh, Mary-Beth
  • Sapronov, Konstantin
  • Schouwenberg, Roel
  • Semenchenko, Artem
  • Shabab, Noushin
  • Shcherbakova, Tatyana
  • Shevchenko, Alisa
  • Shevchenko, Stanislav
  • Shmelev, Yaroslav
  • Shulmin, Alexey
  • Shvetsov, Dmitry
  • Shvetsov, Nikita
  • Sinitsyn, Fedor
  • Slepogin, Nikita
  • Soumenkov, Igor
  • Stepanov, Boris
  • Stolyarov, Vladislav
  • Stoyanov, Ruslan
  • Strohschneider, Jens
  • Tanase, Stefan
  • Tarakanov, Dmitry
  • Unuchek, Roman
  • Vergelis, Maria
  • Vilkov, Dmitry
  • Vinogradov, Dmitry
  • Vlasova, Victoria
  • Vlasova, Anna
  • Volodina, Anna
  • van der Wiel, Jornt
  • Werner, Tillman
  • Wicherski, Georg
  • Willems, Eddy
  • Yampolsky, Boris
  • Yan, Dong
  • Yunakovsky, Sergey
  • Yurzin, Oleg
  • Zablotskaya, Natalya
  • Zaitsev, Oleg
  • Zakorzhevsky, Vyacheslav
  • Zapolyansky, Vladimir
  • Zelensky, Sergey
  • Zelensky, Pavel
  • Zhang, Vigi
  • Zhuravlev, Maxim
  • Ziarek, Maciej
  • Zykov, Konstantin

© 2018 AO Kaspersky Lab. All Rights Reserved.
Registered trademarks and service marks are the property of their respective owners.

Contact us | Privacy Policy | License Agreement

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube
  • RSS
  • Email