DaRK DDoSseR leads to Gh0st RAT
Jump to navigation
Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
(Publication) Google search: [1]
DaRK DDoSseR leads to Gh0st RAT | |
---|---|
Botnet | DaRK DDoSseR, Gh0st RAT |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-11-08 |
Editor/Conference | Trend Micro |
Link | http://blog.trendmicro.com/trendlabs-security-intelligence/dark-ddosser-leads-to-gh0st-rat/ (Archive copy) |
Author | Nart Villeneuve |
Type |
Abstract
“ The malware BKDR_ADDNEW, better known as “DaRK DDoSseR” in the underground, is a tool that provides distributed denial of service (DDOS) capability combined with password stealing functionality. The tool costs $30 and has been available for several years.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1210, editor = {Trend Micro}, author = {Nart Villeneuve}, title = {DaRK DDoSseR leads to Gh0st RAT}, date = {08}, month = Nov, year = {2012}, howpublished = {\url{http://blog.trendmicro.com/trendlabs-security-intelligence/dark-ddosser-leads-to-gh0st-rat/}}, }