McAfee Labs threat advisory : W32.Pinkslipbot
(Publication) Google search: [1]
McAfee Labs threat advisory : W32.Pinkslipbot | |
---|---|
Botnet | Akbot |
Malware | Akbot_(bot) |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / February 22, 2012 |
Editor/Conference | McAfee |
Link | https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT DOCUMENTATION/22000/PD22960/en US/McAfee-Labs-ThreatAdvisory-Pinkslipbot.pdf mcafee.com(Pdf) (mcafee.com(Pdf) Archive copy) |
Author | |
Type |
Abstract
“ The W32/Pinkslipbot worm is capable of spreading over network shares, downloading files, and updating its
software. Additionally, it is capable of receiving back door command from its IRC command and control center. It attempts to steal user information and upload it to FTP sites. Aliases: • Qakbot • Akbot • Qbot Detailed information about the worm, its propagation, and mitigation are in the following sections:
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR914, editor = {McAfee}, author = {}, title = {McAfee Labs threat advisory : W32.Pinkslipbot}, date = {22}, month = Feb, year = {2012}, howpublished = {\url{https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/22000/PD22960/en_US/McAfee-Labs-ThreatAdvisory-Pinkslipbot.pdf mcafee.com(Pdf)}}, }