Difference between revisions of "More Flame/Skywiper CNC behavior uncovered"
Jump to navigation
Jump to search
m (1 revision imported) |
m (Text replacement - " blog.fireeye.com" to "") |
||
Line 5: | Line 5: | ||
|Licence= | |Licence= | ||
|Video= | |Video= | ||
|Link=http://blog.fireeye.com/research/2012/06/flame-skywiper-cnc-update.html | |Link=http://blog.fireeye.com/research/2012/06/flame-skywiper-cnc-update.html | ||
|Author=Ali Islam, | |Author=Ali Islam, | ||
|NomRevue=FireEye Malware Intelligence Lab | |NomRevue=FireEye Malware Intelligence Lab |
Latest revision as of 21:50, 5 August 2015
(Publication) Google search: [1]
More Flame/Skywiper CNC behavior uncovered | |
---|---|
Botnet | Flame, SKyWIper |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 26 juin 2012 |
Editor/Conference | FireEye |
Link | http://blog.fireeye.com/research/2012/06/flame-skywiper-cnc-update.html (Archive copy) |
Author | Ali Islam |
Type |
Abstract
“ When news of the Flame/SkyWiper malware hit the headlines last month, the world went into a frenzy. Flame was immediately hailed as the world’s most sophisticated malware. While security researchers will surely be talking about Flame for years to come, FireEye has since made another discovery regarding Flame’s command and control (CNC) behavior: it appears that the Flamer/sKyWIper malware’s callback has recently changed.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1055, editor = {FireEye}, author = {Ali Islam}, title = {More Flame/Skywiper CNC behavior uncovered}, date = {Error: Invalid time.}, month = Error: Invalid time., year = {2012}, howpublished = {\url{http://blog.fireeye.com/research/2012/06/flame-skywiper-cnc-update.html}}, }