Exploring the market for stolen passwords

From Botnets.fr
Revision as of 22:11, 5 August 2015 by Eric.freyssinet (talk | contribs) (Text replacement - " krebsonsecurity.com" to "")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

Exploring the market for stolen passwords
Botnet Andromeda, Citadel
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 2012-12-26
Editor/Conference Brian Krebs
Link http://krebsonsecurity.com/2012/12/exploring-the-market-for-stolen-passwords/ (Archive copy)
Author Brian Krebs
Type

Abstract

Not long ago, PCs compromised by malware were put to a limited number of fraudulent uses, including spam, click fraud and denial-of-service attacks. These days, computer crooks are extracting and selling a much broader array of data stolen from hacked systems, including passwords and associated email credentials tied to a variety of online retailers.

At the forefront of this trend are the botnet creation kits like Citadel, ZeuS and SpyEye, which make it simple for miscreants to assemble collections of compromised machines. By default, most bot malware will extract any passwords stored in the victim PC’s browser, and will intercept and record any credentials submitted in Web forms, such as when a user enters his credit card number, address, etc. at an online retail shop.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1275,
   editor = {Brian Krebs},
   author = {Brian Krebs},
   title = {Exploring the market for stolen passwords},
   date = {26},
   month = Dec,
   year = {2012},
   howpublished = {\url{http://krebsonsecurity.com/2012/12/exploring-the-market-for-stolen-passwords/}},
 }