Backdoor uses Evernote as command and control server
Revision as of 12:28, 3 August 2015 by Eric.freyssinet (talk | contribs) (Created page with "{{Publication |Editor=Trend Micro |Link=http://blog.trendmicro.com/trendlabs-security-intelligence/backdoor-uses-evernote-as-command-and-control-server/ |Author=Nikko Tamaña,...")
(Publication) Google search: [1]
Backdoor uses Evernote as command and control server | |
---|---|
Botnet | |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | / |
Editor/Conference | Trend Micro |
Link | http://blog.trendmicro.com/trendlabs-security-intelligence/backdoor-uses-evernote-as-command-and-control-server/ (Archive copy) |
Author | Nikko Tamaña |
Type | Blogpost |
Abstract
“
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permittedBFR2206, editor = {Trend Micro}, author = {Nikko Tamaña}, title = {Backdoor uses Evernote as command and control server}, date = {01}, month = May, year = {}, howpublished = {\url{http://blog.trendmicro.com/trendlabs-security-intelligence/backdoor-uses-evernote-as-command-and-control-server/}}, }