Alina: following the shadow part 1
Revision as of 11:41, 18 July 2015 by Eric.freyssinet (talk | contribs) (Created page with "{{Publication |Botnet=Alina, |Year=2013 |Date=2013-05-17 |Editor=Trustwave |Link=https://www.trustwave.com/Resources/SpiderLabs-Blog/Alina--Following-The-Shadow-Part-1/ |Autho...")
(Publication) Google search: [1]
Alina: following the shadow part 1 | |
---|---|
Botnet | Alina |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2013 / 2013-05-17 |
Editor/Conference | Trustwave |
Link | https://www.trustwave.com/Resources/SpiderLabs-Blog/Alina--Following-The-Shadow-Part-1/ (Archive copy) |
Author | Josh Grunzweig |
Type | Blogpost |
Abstract
“ I'm going to break up this post into a few different sections, and talk about how the malware family has evolved over time with respect to various categories. As I started writing this, it became apparent that it wouldn't fit into one blog post. As such, I've split it up into different parts. For this blog post I'm going to focus on the creation timeline, exfiltration, and C&C.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1609, editor = {Trustwave}, author = {Josh Grunzweig}, title = {Alina: following the shadow part 1}, date = {17}, month = May, year = {2013}, howpublished = {\url{https://www.trustwave.com/Resources/SpiderLabs-Blog/Alina--Following-The-Shadow-Part-1/}}, }