The Andromeda/Gamarue botnet is on the rise again
Revision as of 14:52, 18 July 2015 by Eric.freyssinet (talk | contribs)
(Publication) Google search: [1]
The Andromeda/Gamarue botnet is on the rise again | |
---|---|
Botnet | Andromeda, Gamarue |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | Spam |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | / |
Editor/Conference | GData |
Link | https://blog.gdatasoftware.com/blog/article/the-andromedagamarue-botnet-is-on-the-rise-again.html (Archive copy) |
Author | Paul Rascagnères |
Type | Blogpost |
Abstract
“ Attacks carried out with documents pepped up with macros seem to become in vogue again. G DATA’s security experts have analyzed several cases within the last weeks, in which active content in documents triggers an infection. The experts want to explain two different approaches for the same current goal: infect the user with malware that enlists the machine as zombie PC in the Andromeda/Gamarue botnet.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permittedBFR1637, editor = {GData}, author = {Paul Rascagnères}, title = {The Andromeda/Gamarue botnet is on the rise again}, date = {01}, month = May, year = {}, howpublished = {\url{https://blog.gdatasoftware.com/blog/article/the-andromedagamarue-botnet-is-on-the-rise-again.html}}, }