Difference between revisions of "Trojan horse using sender policy framework"

From Botnets.fr
Jump to navigation Jump to search
 
m (Text replacement - " www.symantec.com" to "")
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
{{Publication
{{Publication
|Type=Blogpost
|Type=Blogpost
|Link=http://www.symantec.com/connect/blogs/trojan-horse-using-sender-policy-framework www.symantec.com
|Link=http://www.symantec.com/connect/blogs/trojan-horse-using-sender-policy-framework
|Author=Takashi Katsuki
|Author=Takashi Katsuki
|NomRevue=Symantec Connect
|NomRevue=Symantec Connect

Latest revision as of 21:49, 5 August 2015

(Publication) Google search: [1]

Trojan horse using sender policy framework
Botnet Spachanel
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2013 / 2013-01-25
Editor/Conference Symantec
Link http://www.symantec.com/connect/blogs/trojan-horse-using-sender-policy-framework (Archive copy)
Author Takashi Katsuki
Type Blogpost

Abstract

More recently, I discovered a Trojan horse that uses Sender Policy Framework (SPF), which is an email validation system designed to prevent email spam, to achieve the same goal.

Basically, SPF consists of a domain name server (DNS) request and response. If a sender’s DNS server is set up to use SPF, the DNS response contains the SPF in a text (TXT) record.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1286,
   editor = {Symantec},
   author = {Takashi Katsuki},
   title = {Trojan horse using sender policy framework},
   date = {25},
   month = Jan,
   year = {2013},
   howpublished = {\url{http://www.symantec.com/connect/blogs/trojan-horse-using-sender-policy-framework}},
 }