Botnet command server hidden in Tor

From Botnets.fr
Revision as of 18:18, 3 August 2015 by Eric.freyssinet (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

Botnet command server hidden in Tor
Botnet Skynet
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol IRC, Tor
Date 2012 / 2012-09-10
Editor/Conference GData
Link https://blog.gdatasoftware.com/blog/article/botnet-command-server-hidden-in-tor.html (Archive copy)
Author TS
Type Blogpost

Abstract

The G Data SecurityLabs recently identified a malware sample that takes the next step in Command-and-Control (short: C&C) communication evolution, regarding C&C traffic obfuscation. The botnet owners placed their C&C server, which uses the common IRC protocol, as a hidden service inside of the Tor network.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR2229,
   editor = {GData},
   author = {TS},
   title = {Botnet command server hidden in Tor},
   date = {10},
   month = Sep,
   year = {2012},
   howpublished = {\url{https://blog.gdatasoftware.com/blog/article/botnet-command-server-hidden-in-tor.html}},
 }