Ramnit goes social
Revision as of 20:50, 20 August 2015 by Eric.freyssinet (talk | contribs)
(Publication) Google search: [1]
Ramnit goes social | |
---|---|
Botnet | Ramnit |
Malware | Ramnit (bot) |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-01-05 |
Editor/Conference | Seculert |
Link | http://blog.seculert.com/2012/01/ramnit-goes-social.html (Archive copy) |
Author | |
Type | Blogpost |
Abstract
“ Discovered in April 2010, the Microsoft Malware Protection Center (MMPC) described Ramnit as “a multi-component malware family which infects Windows executable as well as HTML files”, “stealing sensitive information such as stored FTP credentials and browser cookies”. In July 2011 a Symantec report [PDF] estimated that Ramnit worm variants accounted for 17.3 percent of all new malicious software infections.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1220, editor = {Seculert}, author = {}, title = {Ramnit goes social}, date = {05}, month = Jan, year = {2012}, howpublished = {\url{http://blog.seculert.com/2012/01/ramnit-goes-social.html}}, }