Critroni crypto ransomware seen using Tor for command and control
Revision as of 21:10, 5 August 2015 by Eric.freyssinet (talk | contribs) (Text replacement - " threatpost.com" to "")
(Publication) Google search: [1]
Critroni crypto ransomware seen using Tor for command and control | |
---|---|
Botnet | Critroni |
Malware | |
Botnet/malware group | |
Exploit kits | Angler |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | Tor |
Date | 2014 / 2014-07-18 |
Editor/Conference | Kaspersky lab |
Link | http://threatpost.com/critroni-crypto-ransomware-seen-using-tor-for-command-and-control/107306 (Archive copy) |
Author | Dennis Fisher |
Type | Blogpost |
Abstract
“ There’s a new kid on the crypto ransomware block, known as Critroni, that’s been sold in underground forums for the last month or so and is now being dropped by the Angler exploit kit. The ransomware includes a number of unusual features and researchers say it’s the first crypto ransomware seen using the Tor network for command and control.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2014BFR1389, editor = {Kaspersky lab}, author = {Dennis Fisher}, title = {Critroni crypto ransomware seen using Tor for command and control}, date = {18}, month = Jul, year = {2014}, howpublished = {\url{http://threatpost.com/critroni-crypto-ransomware-seen-using-tor-for-command-and-control/107306}}, }