An overnight sensation — CoreBot returns as a full-fledged financial malware
Jump to navigation
Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
(Publication) Google search: [1]
An overnight sensation — CoreBot returns as a full-fledged financial malware | |
---|---|
Botnet | CoreBot |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2015 / 2015-09-10 |
Editor/Conference | Security Intelligence |
Link | https://securityintelligence.com/an-overnight-sensation-corebot-returns-as-a-full-fledged-financial-malware/ (Archive copy) |
Author | Limor Kessem, Martin Korman |
Type | Blogpost |
Abstract
“ CoreBot’s developers did not wait long. Within a matter of days, new samples of CoreBot, discovered and analyzed by IBM X-Force researchers, revealed that the malware has become a full-fledged banking Trojan — almost overnight. This seemingly quick evolution is most likely due to a longer development and testing phase that just recently ended.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2015BFR4778, editor = {Security Intelligence}, author = {Limor Kessem, Martin Korman}, title = {An overnight sensation — CoreBot returns as a full-fledged financial malware}, date = {10}, month = Sep, year = {2015}, howpublished = {\url{https://securityintelligence.com/an-overnight-sensation-corebot-returns-as-a-full-fledged-financial-malware/}}, }