Difference between revisions of "Malware Uses Google Go Language"
Jump to navigation
Jump to search
m (1 revision imported) |
m (Text replacement - "Campaign1=" to "Campaign=") |
||
Line 18: | Line 18: | ||
|OffensiveTool= | |OffensiveTool= | ||
|ExploitKit=, | |ExploitKit=, | ||
| | |Campaign= | ||
|Campaign2= | |Campaign2= | ||
|Campaign3= | |Campaign3= |
Revision as of 22:32, 31 July 2015
(Publication) Google search: [1]
Malware Uses Google Go Language | |
---|---|
Botnet | Encriyoko |
Malware | Trojan.Encriyoko |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-09-18 |
Editor/Conference | Symantec |
Link | http://www.symantec.com/connect/blogs/malware-uses-google-go-language www.symantec.com (www.symantec.com Archive copy) |
Author | Flora Liu |
Type | Blogpost |
Abstract
“ Designed in 2007 and introduced in late 2009, the Go programming language developed by Google has been gaining momentum the past three years. It is now being used to develop malware. Recently seen in the wild, Trojan.Encriyoko is a new threat associated with components which are written in Go. The Trojan attempts to encrypt various file formats on compromised computers, rendering the encrypted files unusable...
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1347, editor = {Symantec}, author = {Flora Liu}, title = {Malware Uses Google Go Language}, date = {18}, month = Sep, year = {2012}, howpublished = {\url{http://www.symantec.com/connect/blogs/malware-uses-google-go-language www.symantec.com}}, }