Relentless Zbot and anti-emulations
Revision as of 21:51, 5 August 2015 by Eric.freyssinet (talk | contribs) (Text replacement - " www.symantec.com" to "")
(Publication) Google search: [1]
Relentless Zbot and anti-emulations | |
---|---|
![]() | |
Botnet | ZeuS |
Malware | Zbot |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 03 Jul 2012 |
Editor/Conference | Symantec |
Link | http://www.symantec.com/connect/blogs/relentless-zbot-and-anti-emulations (Archive copy) |
Author | Anoirel Issa |
Type |
Abstract
“ A couple of months ago, Microsoft took out some Trojan.Zbot servers across the world. The impact was short-lived. Even though for a span of about two weeks, we saw virtually no Trojan.Zbot activity, relentless Trojan.Zbot activity has resumed—with some added new social-engineering techniques as well as some new techniques to help Trojan.Zbot avoid antivirus detection.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1064, editor = {Symantec}, author = {Anoirel Issa}, title = {Relentless Zbot and anti-emulations}, date = {03}, month = Jul, year = {2012}, howpublished = {\url{http://www.symantec.com/connect/blogs/relentless-zbot-and-anti-emulations}}, }