Critroni crypto ransomware seen using Tor for command and control

From Botnets.fr
Revision as of 21:10, 5 August 2015 by Eric.freyssinet (talk | contribs) (Text replacement - " threatpost.com" to "")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

Critroni crypto ransomware seen using Tor for command and control
Botnet Critroni
Malware
Botnet/malware group
Exploit kits Angler
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol Tor
Date 2014 / 2014-07-18
Editor/Conference Kaspersky lab
Link http://threatpost.com/critroni-crypto-ransomware-seen-using-tor-for-command-and-control/107306 (Archive copy)
Author Dennis Fisher
Type Blogpost

Abstract

There’s a new kid on the crypto ransomware block, known as Critroni, that’s been sold in underground forums for the last month or so and is now being dropped by the Angler exploit kit. The ransomware includes a number of unusual features and researchers say it’s the first crypto ransomware seen using the Tor network for command and control.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2014BFR1389,
   editor = {Kaspersky lab},
   author = {Dennis Fisher},
   title = {Critroni crypto ransomware seen using Tor for command and control},
   date = {18},
   month = Jul,
   year = {2014},
   howpublished = {\url{http://threatpost.com/critroni-crypto-ransomware-seen-using-tor-for-command-and-control/107306}},
 }