Digging inside Tinba malware - A walkthrough

From Botnets.fr
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

(Publication) Google search: [1]

Digging inside Tinba malware - A walkthrough
Botnet Tinba
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 14 juin 2012
Editor/Conference SecNiche
Link http://secniche.blogspot.it/2012/06/two-weeks-back-tinba-malware-hit.html secniche.blogspot.it (secniche.blogspot.it Archive copy)
Author Aditya K Sood
Type

Abstract

Two weeks back, Tinba malware hit the internet. Though our team spent some time in looking at the various artifacts of Tinba malware. ZeuS and SpyEye have given birth to new breed of botnets. The upcoming generation of botnets are extensively utilizing the tactics introduced by ZeuS and SpyEye. Tinba is a small notorious malware that aimed specifically for stealing information from the browsers. For more details about Man-in-the-Browser (MitB), one can read our paper on FormGrabbing here - http://www.virusbtn.com/virusbulletin/archive/2011/11/vb201111-form-grabbing.

Other researchers have presented details about Tinba which can be found here - http://www.csis.dk/en/csis/news/3566/

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1046,
   editor = {SecNiche},
   author = {Aditya K Sood},
   title = {Digging inside Tinba malware - A walkthrough},
   date = {Error: Invalid time.},
   month = Error: Invalid time.,
   year = {2012},
   howpublished = {\url{http://secniche.blogspot.it/2012/06/two-weeks-back-tinba-malware-hit.html secniche.blogspot.it}},
 }