Battling the Zbot threat
Jump to navigation
Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
(Publication) Google search: [1]
Battling the Zbot threat | |
---|---|
Botnet | ZeuS |
Malware | Zbot |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2010 / Special Edition"Special Edition" contains an extrinsic dash or other characters that are invalid for a date interpretation. |
Editor/Conference | Microsoft |
Link | http://download.microsoft.com/download/A/2/2/A226868B-7922-4655-BF48-F11DDEE3E63C/Battling%20the%20Zbot%20threat.pdf (Archive copy) |
Author | T.J. Campana, Joe Faulhaber, Paul Henry, Matt McCormack, Frank Simorjay, Holly Stewart |
Type |
Abstract
“ This document provides an overview of the Win32/Zbot family of password-stealing trojans. The document examines the background of Win32/Zbot, its functionality, how it works, and provides telemetry data and analysis from calendar year 2010 about how this threat is detected and removed by Microsoft antimalware products and services.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2010BFR817, editor = {Microsoft}, author = {T.J. Campana, Joe Faulhaber, Paul Henry, Matt McCormack, Frank Simorjay, Holly Stewart}, title = {Battling the Zbot threat}, date = {Error: Invalid time.}, month = Error: Invalid time., year = {2010}, howpublished = {\url{http://download.microsoft.com/download/A/2/2/A226868B-7922-4655-BF48-F11DDEE3E63C/Battling%20the%20Zbot%20threat.pdf}}, }