Difference between revisions of "DaRK DDoSseR leads to Gh0st RAT"
Jump to navigation
Jump to search
m (1 revision imported) |
|
(No difference)
|
Revision as of 15:28, 7 February 2015
(Publication) Google search: [1]
DaRK DDoSseR leads to Gh0st RAT | |
---|---|
Botnet | DaRK DDoSseR, Gh0st RAT |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-11-08 |
Editor/Conference | Trend Micro |
Link | http://blog.trendmicro.com/trendlabs-security-intelligence/dark-ddosser-leads-to-gh0st-rat/ blog.trendmicro.com (blog.trendmicro.com Archive copy) |
Author | Nart Villeneuve |
Type |
Abstract
“ The malware BKDR_ADDNEW, better known as “DaRK DDoSseR” in the underground, is a tool that provides distributed denial of service (DDOS) capability combined with password stealing functionality. The tool costs $30 and has been available for several years.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1210, editor = {Trend Micro}, author = {Nart Villeneuve}, title = {DaRK DDoSseR leads to Gh0st RAT}, date = {08}, month = Nov, year = {2012}, howpublished = {\url{http://blog.trendmicro.com/trendlabs-security-intelligence/dark-ddosser-leads-to-gh0st-rat/ blog.trendmicro.com}}, }