ZeuS Gameover overview
Revision as of 15:25, 31 July 2015 by Eric.freyssinet (talk | contribs)
(Publication) Google search: [1]
ZeuS Gameover overview | |
---|---|
![]() | |
Botnet | Gameover |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / Sept 25, 2012"Sept 25, 2012" contains a sequence that could not be interpreted against an available match matrix for date components. |
Editor/Conference | Minded Security Research Lab |
Link | http://blog.mindedsecurity.com/2012/09/zeus-gameover-overview.html blog.mindedsecurity.com (blog.mindedsecurity.com Archive copy) |
Author | Giuseppe Bonfà |
Type |
Abstract
“ In this blog post we are going to discuss about an interesting ZeuS variant called “Gameover” that in the last quarter showed an impressive activity in terms of spread and infection rate especially in Italy.
- According to f-secure: “Italy has a significant number of Gameover infections.”
- And according to the Secureworks: “on 678,000 unique Gameover bots, of which, 5.1% are Italian.”
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1174, editor = {Minded Security Research Lab}, author = {Giuseppe Bonfà}, title = {ZeuS Gameover overview}, date = {25}, month = Sep, year = {2012}, howpublished = {\url{http://blog.mindedsecurity.com/2012/09/zeus-gameover-overview.html blog.mindedsecurity.com}}, }