Difference between revisions of "Botnet command server hidden in Tor"
Jump to navigation
Jump to search
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
{{Publication | {{Publication | ||
|Botnet=Skynet, | |||
|CCProtocol=IRC, Tor, | |CCProtocol=IRC, Tor, | ||
|Year=2012 | |Year=2012 | ||
Line 7: | Line 8: | ||
|Author=TS, | |Author=TS, | ||
|Type=Blogpost | |Type=Blogpost | ||
|Abstract=The G Data SecurityLabs recently identified a malware sample that takes the next step in Command-and-Control (short: C&C) communication evolution, regarding C&C traffic obfuscation. The botnet owners placed their C&C server, which uses the common IRC protocol, as a hidden service inside of the Tor network. | |||
}} | }} |
Latest revision as of 19:18, 3 August 2015
(Publication) Google search: [1]
Botnet command server hidden in Tor | |
---|---|
Botnet | Skynet |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | IRC, Tor |
Date | 2012 / 2012-09-10 |
Editor/Conference | GData |
Link | https://blog.gdatasoftware.com/blog/article/botnet-command-server-hidden-in-tor.html (Archive copy) |
Author | TS |
Type | Blogpost |
Abstract
“ The G Data SecurityLabs recently identified a malware sample that takes the next step in Command-and-Control (short: C&C) communication evolution, regarding C&C traffic obfuscation. The botnet owners placed their C&C server, which uses the common IRC protocol, as a hidden service inside of the Tor network.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR2229, editor = {GData}, author = {TS}, title = {Botnet command server hidden in Tor}, date = {10}, month = Sep, year = {2012}, howpublished = {\url{https://blog.gdatasoftware.com/blog/article/botnet-command-server-hidden-in-tor.html}}, }