Backdoor uses Evernote as command and control server

From Botnets.fr
Revision as of 12:28, 3 August 2015 by Eric.freyssinet (talk | contribs) (Created page with "{{Publication |Editor=Trend Micro |Link=http://blog.trendmicro.com/trendlabs-security-intelligence/backdoor-uses-evernote-as-command-and-control-server/ |Author=Nikko Tamaña,...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

Backdoor uses Evernote as command and control server
Botnet
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date /
Editor/Conference Trend Micro
Link http://blog.trendmicro.com/trendlabs-security-intelligence/backdoor-uses-evernote-as-command-and-control-server/ (Archive copy)
Author Nikko Tamaña
Type Blogpost

Abstract

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permittedBFR2206,
   editor = {Trend Micro},
   author = {Nikko Tamaña},
   title = {Backdoor uses Evernote as command and control server},
   date = {05},
   month = May,
   year = {},
   howpublished = {\url{http://blog.trendmicro.com/trendlabs-security-intelligence/backdoor-uses-evernote-as-command-and-control-server/}},
 }