Difference between revisions of "Akbot"

From Botnets.fr
Jump to navigation Jump to search
m (Text replacement - "=Unknown" to "=")
 
Line 6: Line 6:
|Feature=File download, Data theft, Shared drive vector, Worm, Keylogger, Password theft, System information gathering, Certificate theft, Rootkit,
|Feature=File download, Data theft, Shared drive vector, Worm, Keylogger, Password theft, System information gathering, Certificate theft, Rootkit,
|BeginYear=2001
|BeginYear=2001
|EndYear=Unknown
|EndYear=
|Group=Stealing,
|Group=Stealing,
|Fonctionnalités=
|Fonctionnalités=
Line 12: Line 12:
|Infrastructure=
|Infrastructure=
|Commercialisation=
|Commercialisation=
|Etat=Unknown
|Etat=
|Victime1=University of Pennsylvania
|Victime1=University of Pennsylvania
|Victime2=
|Victime2=

Latest revision as of 15:44, 8 August 2015

(Botnet) Link to the old Wiki page : [1] / Google search: [2]

Akbot
Alias Qakbot, Pinkslipbot, Qbot
Group Stealing
Parent
Sibling
Family
Relations Variants:

Sibling of:
Parent of:
Distribution of:
Campaigns:

Target University of Pennsylvania
Origin
Distribution vector Shared drive vector
UserAgent
CCProtocol IRC (Centralized), FTP (Centralized)
Activity 2001 /
Status
Language
Programming language
Operation/Working group

Introduction

Features


Associated images

Checksums / AV databases

Publications

 AuthorEditorYear
McAfee Labs threat advisory : W32.PinkslipbotMcAfee2012
W32.Qakbot in detailNicolas FalliereSymantec2001