Difference between revisions of "Citadel trojan malware analysis"
Jump to navigation
Jump to search
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
{{Publication | {{Publication | ||
|Botnet=Citadel, | |||
|Year=2012 | |Year=2012 | ||
|Date=2012-09-14 | |Date=2012-09-14 | ||
|Editor=DELL SecureWorks | |Editor=DELL SecureWorks | ||
|Link= | |Link=http://botnetlegalnotice.com/citadel/files/Patel_Decl_Ex20.pdf | ||
|Author=Jason Milletary | |Author=Jason Milletary | ||
|Type= | |Type=Tech report | ||
|Abstract=In May 2011, source code for the infamous Zeus Trojan horse was leaked on the Internet. In addition to providing a glimpse inside a notorious piece of adversarial tradecraft, the source code provided an opportunity for enterprising malware authors to meet an emerging demand for cybercrime tools. Two major toolkits based on the leaked Zeus source code have become renown in the marketplace: ICE IX and Citadel. | |Abstract=In May 2011, source code for the infamous Zeus Trojan horse was leaked on the Internet. In addition to providing a glimpse inside a notorious piece of adversarial tradecraft, the source code provided an opportunity for enterprising malware authors to meet an emerging demand for cybercrime tools. Two major toolkits based on the leaked Zeus source code have become renown in the marketplace: ICE IX and Citadel. | ||
}} | }} |
Latest revision as of 01:08, 22 August 2015
(Publication) Google search: [1]
Citadel trojan malware analysis | |
---|---|
Botnet | Citadel |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-09-14 |
Editor/Conference | DELL SecureWorks |
Link | http://botnetlegalnotice.com/citadel/files/Patel Decl Ex20.pdf (Archive copy) |
Author | Jason Milletary |
Type | Tech report |
Abstract
“ In May 2011, source code for the infamous Zeus Trojan horse was leaked on the Internet. In addition to providing a glimpse inside a notorious piece of adversarial tradecraft, the source code provided an opportunity for enterprising malware authors to meet an emerging demand for cybercrime tools. Two major toolkits based on the leaked Zeus source code have become renown in the marketplace: ICE IX and Citadel.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR4747, editor = {DELL SecureWorks}, author = {Jason Milletary}, title = {Citadel trojan malware analysis}, date = {14}, month = Sep, year = {2012}, howpublished = {\url{http://botnetlegalnotice.com/citadel/files/Patel_Decl_Ex20.pdf}}, }