Difference between revisions of "Kraken botnet infiltration"
Jump to navigation
Jump to search
m (1 revision imported) |
Latest revision as of 16:23, 7 February 2015
(Publication) Google search: [1]
Kraken botnet infiltration | |
---|---|
Botnet | Kraken |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | HTTP |
Date | 2008 / 2008-04-28 |
Editor/Conference | Tipping Point |
Link | http://dvlabs.tippingpoint.com/blog/2008/04/28/kraken-botnet-infiltration dvlabs.tippingpoint.com (dvlabs.tippingpoint.com Archive copy) |
Author | Pedram Amini |
Type |
Abstract
“ Earlier this month a number of articles surfaced on the research and disagreements with regards to the size and classification of a large bot net named Kraken. At the front line of the debate was SecureWorks and Damballa. Secureworks claims Kraken is actually Bobax and estimates the bot net to include over 185,000 compromised systems. Damballa disagrees stating that Kraken is an entirely new bot net with a size over twice as large as Storm. Semantics aside no one disagrees that Kraken/Bobax is among the largest of the known bot nets if not the largest.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2008BFR887, editor = {Tipping Point}, author = {Pedram Amini}, title = {Kraken botnet infiltration}, date = {28}, month = Apr, year = {2008}, howpublished = {\url{http://dvlabs.tippingpoint.com/blog/2008/04/28/kraken-botnet-infiltration dvlabs.tippingpoint.com}}, }