First widespread virus cross-infection
Revision as of 23:22, 30 July 2013 by Eric.freyssinet (talk | contribs)
(Publication) Google search: [1]
First widespread virus cross-infection | |
---|---|
Botnet | Xpiro |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2013 / 2013-07-23 |
Editor/Conference | Symantec |
Link | http://www.symantec.com/connect/blogs/first-widespread-virus-cross-infection www.symantec.com (www.symantec.com Archive copy) |
Author | Jeet Morparia |
Type | Blogpost |
Abstract
“ After being in oblivion for a while, the Xpiro family of file infectors is back with a bang—and this time with some notorious capabilities. Not only does the new variant infect 32-bit files, it also has broadened its scope of infection to 64-bit files. The infections are cross-platform (a 32-bit Xpiro variant can infect a 64-bit executable file, and vice versa) and persistent in nature. Additionally, this virus has also enhanced its information stealing capabilities by adding Firefox and Chrome extensions to monitor browser sessions.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1360, editor = {Symantec}, author = {Jeet Morparia}, title = {First widespread virus cross-infection}, date = {23}, month = Jul, year = {2013}, howpublished = {\url{http://www.symantec.com/connect/blogs/first-widespread-virus-cross-infection www.symantec.com}}, }