The ‘Madi’ infostealers - a detailed analysis
Revision as of 19:06, 7 February 2015 by Eric.freyssinet (talk | contribs) (Text replacement - " www.securelist.com" to "")
(Publication) Google search: [1]
The ‘Madi’ infostealers - a detailed analysis | |
---|---|
![]() | |
Botnet | Madi |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / July 31, 2012 |
Editor/Conference | Kaspersky lab |
Link | http://www.securelist.com/en/analysis/204792237/The Madi infostealers a detailed analysis (Archive copy) |
Author | Nicolas Brulez |
Type |
Abstract
“ On 17 July, we published a blog about Madi and the ongoing campaign used to infiltrate computer systems throughout the Middle East that has targeted users in Iran, Israel, Afghanistan and other individuals scattered across the globe. Here is the follow up with a detailed analysis of the infostealer used in the campaign.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1073, editor = {Kaspersky lab}, author = {Nicolas Brulez}, title = {The ‘Madi’ infostealers - a detailed analysis}, date = {31}, month = Jul, year = {2012}, howpublished = {\url{http://www.securelist.com/en/analysis/204792237/The_Madi_infostealers_a_detailed_analysis}}, }