NGRBot spreads via chat
(Publication) Google search: [1]
NGRBot spreads via chat | |
---|---|
Botnet | Dorkbot |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / September 20, 2012 |
Editor/Conference | McAfee |
Link | http://blogs.mcafee.com/mcafee-labs/ngrbot-spreads-via-chat (Archive copy) |
Author | Niranjan Jayanand |
Type |
Abstract
“ NGRBot is a worm that propagates through chat messengers, the Internet Relay Chat channel, social networking sites etc. It steals FTP and browser passwords and can cause a denial of service by flooding.
NGRBots use the IRC network for file transfer, sending and receiving commands between zombie network machines and the attacker’s IRC server, and monitoring and controlling network connectivity and intercept. It employs a user-mode rootkit technique to hide and steal its victim’s information. This family of bot is also designed to infect HTML pages with iframes, causing redirections, blocking victims from getting updates from security/antimalware products, and killing those services. The bot is designed to connect via a predefined IRC channel and communicate with a remote botnet.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1166, editor = {McAfee}, author = {Niranjan Jayanand}, title = {NGRBot spreads via chat}, date = {20}, month = Sep, year = {2012}, howpublished = {\url{http://blogs.mcafee.com/mcafee-labs/ngrbot-spreads-via-chat}}, }