An overnight sensation — CoreBot returns as a full-fledged financial malware

From Botnets.fr
Revision as of 15:00, 12 September 2015 by Eric.freyssinet (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

(Publication) Google search: [1]

An overnight sensation — CoreBot returns as a full-fledged financial malware
Botnet CoreBot
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2015 / 2015-09-10
Editor/Conference Security Intelligence
Link https://securityintelligence.com/an-overnight-sensation-corebot-returns-as-a-full-fledged-financial-malware/ (Archive copy)
Author Limor Kessem, Martin Korman
Type Blogpost

Abstract

CoreBot’s developers did not wait long. Within a matter of days, new samples of CoreBot, discovered and analyzed by IBM X-Force researchers, revealed that the malware has become a full-fledged banking Trojan — almost overnight. This seemingly quick evolution is most likely due to a longer development and testing phase that just recently ended.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2015BFR4778,
   editor = {Security Intelligence},
   author = {Limor Kessem, Martin Korman},
   title = {An overnight sensation — CoreBot returns as a full-fledged financial malware},
   date = {10},
   month = Sep,
   year = {2015},
   howpublished = {\url{https://securityintelligence.com/an-overnight-sensation-corebot-returns-as-a-full-fledged-financial-malware/}},
 }