Difference between revisions of "First widespread virus cross-infection"
Jump to navigation
Jump to search
m (1 revision imported) |
m (Text replacement - " www.symantec.com" to "") |
||
Line 1: | Line 1: | ||
{{Publication | {{Publication | ||
|Type=Blogpost | |Type=Blogpost | ||
|Link=http://www.symantec.com/connect/blogs/first-widespread-virus-cross-infection | |Link=http://www.symantec.com/connect/blogs/first-widespread-virus-cross-infection | ||
|Author=Jeet Morparia | |Author=Jeet Morparia | ||
|NomRevue=Symantec Connect | |NomRevue=Symantec Connect |
Latest revision as of 21:50, 5 August 2015
(Publication) Google search: [1]
First widespread virus cross-infection | |
---|---|
Botnet | Xpiro |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2013 / 2013-07-23 |
Editor/Conference | Symantec |
Link | http://www.symantec.com/connect/blogs/first-widespread-virus-cross-infection (Archive copy) |
Author | Jeet Morparia |
Type | Blogpost |
Abstract
“ After being in oblivion for a while, the Xpiro family of file infectors is back with a bang—and this time with some notorious capabilities. Not only does the new variant infect 32-bit files, it also has broadened its scope of infection to 64-bit files. The infections are cross-platform (a 32-bit Xpiro variant can infect a 64-bit executable file, and vice versa) and persistent in nature. Additionally, this virus has also enhanced its information stealing capabilities by adding Firefox and Chrome extensions to monitor browser sessions.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1360, editor = {Symantec}, author = {Jeet Morparia}, title = {First widespread virus cross-infection}, date = {23}, month = Jul, year = {2013}, howpublished = {\url{http://www.symantec.com/connect/blogs/first-widespread-virus-cross-infection}}, }