Battling the Rustock threat

From Botnets.fr
Revision as of 21:22, 5 August 2015 by Eric.freyssinet (talk | contribs) (Text replacement - " go.microsoft.com" to "")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

Battling the Rustock threat
Battling the Rustock Threat English P9.png
Botnet Rustock
Malware Rustock, Kelihos, Renos, Winwebsec, Stasky, Bubnix, Meredrop, Bubnix
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2011 / Special Edition"Special Edition" contains an extrinsic dash or other characters that are invalid for a date interpretation.
Editor/Conference Microsoft
Link http://go.microsoft.com/?linkid=9777259 (Archive copy)
Author David Anselmi, Richard Boscovich, T.J. Campana, Samantha Doerr, Marc Lauricella, Oleg Petrovsky, Tareq Saade, Holly Stewart
Type

Abstract

This document provides an overview of the Win32/Rustock family of rootkit-enabled backdoor trojans. The document examines the background of Win32/Rustock, its functionality, how it works, and provides threat telemetry data and analysis from calendar year 2010 through May 2011. In addition, this document details the legal and technical action used to takedown the Rustock botnet and how to detect and remove the threat using Microsoft antimalware products.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2011BFR818,
   editor = {Microsoft},
   author = {David Anselmi, Richard Boscovich, T.J. Campana, Samantha Doerr, Marc Lauricella, Oleg Petrovsky, Tareq Saade, Holly Stewart},
   title = {Battling the Rustock threat},
   date = {Error: Invalid time.},
   month = Error: Invalid time.,
   year = {2011},
   howpublished = {\url{http://go.microsoft.com/?linkid=9777259}},
 }