Blackhole & Cridex: season 2 episode 1: Intuit spam & SSL traffic analysis
Jump to navigation
Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
(Publication) Google search: [1]
Blackhole & Cridex: season 2 episode 1: Intuit spam & SSL traffic analysis | |
---|---|
Botnet | Cridex, Feodo |
Malware | Bugat |
Botnet/malware group | |
Exploit kits | Blackhole |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-10-04 |
Editor/Conference | |
Link | http://www.deependresearch.org/2012/10/blackhole-cridex-season-2-episode-1.html (Archive copy) |
Author | André M. DiMino |
Type |
Abstract
“ The other day, I received another spam email, this time supposedly from Intuit. Since I know that Blackhole2 is now directing to Bugat/Feodo/Cridex banking malware, I wanted to look more closely and see what might be new. The "Intuit" email looked like this, and similar text context is shown below:
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1183, editor = {}, author = {André M. DiMino}, title = {Blackhole & Cridex: season 2 episode 1: Intuit spam & SSL traffic analysis}, date = {04}, month = Oct, year = {2012}, howpublished = {\url{http://www.deependresearch.org/2012/10/blackhole-cridex-season-2-episode-1.html}}, }