Difference between revisions of "Trojan horse using sender policy framework"
Jump to navigation
Jump to search
m (1 revision imported) |
Revision as of 16:29, 7 February 2015
(Publication) Google search: [1]
Trojan horse using sender policy framework | |
---|---|
Botnet | Spachanel |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2013 / 2013-01-25 |
Editor/Conference | Symantec |
Link | http://www.symantec.com/connect/blogs/trojan-horse-using-sender-policy-framework www.symantec.com (www.symantec.com Archive copy) |
Author | Takashi Katsuki |
Type | Blogpost |
Abstract
“ More recently, I discovered a Trojan horse that uses Sender Policy Framework (SPF), which is an email validation system designed to prevent email spam, to achieve the same goal.
Basically, SPF consists of a domain name server (DNS) request and response. If a sender’s DNS server is set up to use SPF, the DNS response contains the SPF in a text (TXT) record.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1286, editor = {Symantec}, author = {Takashi Katsuki}, title = {Trojan horse using sender policy framework}, date = {25}, month = Jan, year = {2013}, howpublished = {\url{http://www.symantec.com/connect/blogs/trojan-horse-using-sender-policy-framework www.symantec.com}}, }