Difference between revisions of "Critroni crypto ransomware seen using Tor for command and control"
Jump to navigation
Jump to search
m (Remplacement de texte — « Kaspersky lab lab » par « Kaspersky lab ») |
m (Text replacement - " threatpost.com" to "") |
||
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
{{Publication | {{Publication | ||
|Type=Blogpost | |Type=Blogpost | ||
|Link=http://threatpost.com/critroni-crypto-ransomware-seen-using-tor-for-command-and-control/107306 | |Link=http://threatpost.com/critroni-crypto-ransomware-seen-using-tor-for-command-and-control/107306 | ||
|Author=Dennis Fisher | |Author=Dennis Fisher | ||
|NomRevue=Threatpost | |NomRevue=Threatpost | ||
Line 9: | Line 9: | ||
|Botnet=Critroni | |Botnet=Critroni | ||
|ExploitKit=Angler | |ExploitKit=Angler | ||
|CCProtocol= | |CCProtocol=Tor | ||
|Abstract=There’s a new kid on the crypto ransomware block, known as Critroni, that’s been sold in underground forums for the last month or so and is now being dropped by the Angler exploit kit. The ransomware includes a number of unusual features and researchers say it’s the first crypto ransomware seen using the Tor network for command and control. | |Abstract=There’s a new kid on the crypto ransomware block, known as Critroni, that’s been sold in underground forums for the last month or so and is now being dropped by the Angler exploit kit. The ransomware includes a number of unusual features and researchers say it’s the first crypto ransomware seen using the Tor network for command and control. | ||
}} | }} |
Latest revision as of 22:10, 5 August 2015
(Publication) Google search: [1]
Critroni crypto ransomware seen using Tor for command and control | |
---|---|
Botnet | Critroni |
Malware | |
Botnet/malware group | |
Exploit kits | Angler |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | Tor |
Date | 2014 / 2014-07-18 |
Editor/Conference | Kaspersky lab |
Link | http://threatpost.com/critroni-crypto-ransomware-seen-using-tor-for-command-and-control/107306 (Archive copy) |
Author | Dennis Fisher |
Type | Blogpost |
Abstract
“ There’s a new kid on the crypto ransomware block, known as Critroni, that’s been sold in underground forums for the last month or so and is now being dropped by the Angler exploit kit. The ransomware includes a number of unusual features and researchers say it’s the first crypto ransomware seen using the Tor network for command and control.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2014BFR1389, editor = {Kaspersky lab}, author = {Dennis Fisher}, title = {Critroni crypto ransomware seen using Tor for command and control}, date = {18}, month = Jul, year = {2014}, howpublished = {\url{http://threatpost.com/critroni-crypto-ransomware-seen-using-tor-for-command-and-control/107306}}, }