Research Win32/Slenfbot
Revision as of 21:30, 5 August 2015 by Eric.freyssinet (talk | contribs) (Text replacement - " août " to " aug")
(Publication) Google search: [1]
Research Win32/Slenfbot | |
---|---|
Botnet | |
Malware | Slenfbot |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2011 / 16 aug2008 |
Editor/Conference | Microsoft |
Link | http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?name=Win32%2fSlenfbot (Archive copy) |
Author | Hamish O'Dea, David Wood |
Type |
Abstract
“ Win32/Slenfbot is a worm that can spread via instant messaging programs, which may include MSN Messenger, Yahoo Messenger and Skype. It may also spread via removable drives or exploiting the MS06-040 vulnerability. This worm spreads automatically via shares, but must be ordered to spread via exploit or instant messaging by a remote attacker. The worm also contains backdoor functionality that allows unauthorized access to an affected machine.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2011BFR909, editor = {Microsoft}, author = {Hamish O'Dea, David Wood}, title = {Research Win32/Slenfbot}, date = {16}, month = Aug, year = {2011}, howpublished = {\url{http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?name=Win32%2fSlenfbot}}, }