Malware targeting Windows 8 uses Google Docs
Revision as of 18:51, 17 November 2012 by Eric.freyssinet (talk | contribs)
(Publication) Google search: [1]
Malware targeting Windows 8 uses Google Docs | |
---|---|
Botnet | Makadocs |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-11-17 |
Editor/Conference | Symantec |
Link | http://www.symantec.com/connect/blogs/malware-targeting-windows-8-uses-google-docs www.symantec.com (www.symantec.com Archive copy) |
Author | Takashi Katsuki |
Type |
Abstract
“ Initially, I thought that Backdoor.Makadocs was a simple and typical back door Trojan horse. It receives and executes commands from a command-and-control (C&C) server and it gathers information from the compromised computer including the host name and the operating system type. Interestingly, the malware author has also considered the possibility that the compromised computer could be running Windows 8 or Windows Server 2012.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1203, editor = {Symantec}, author = {Takashi Katsuki}, title = {Malware targeting Windows 8 uses Google Docs}, date = {17}, month = Nov, year = {2012}, howpublished = {\url{http://www.symantec.com/connect/blogs/malware-targeting-windows-8-uses-google-docs www.symantec.com}}, }