Difference between revisions of "Luckycat"
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
{{Campaign | {{Campaign | ||
|Sibling=ShadowNet, Duojeen, Sparksrv, Comfoo | |||
|Botnet=Wimmie, | |Botnet=Wimmie, | ||
|Vector=Spear phishing, | |Vector=Spear phishing, | ||
Line 5: | Line 6: | ||
|BeginYear=2011 | |BeginYear=2011 | ||
|Target=Aerospace, Energy, Engineering, Shipping, Military research, Tibetan activists, | |Target=Aerospace, Energy, Engineering, Shipping, Military research, Tibetan activists, | ||
}} | }} |
Revision as of 04:04, 19 August 2015
(Campaign/Crimeware group) Link to the old Wiki page : [1] / Google search: [2]
Luckycat | |
---|---|
Alias | |
Parent | |
Sibling | ShadowNet, Duojeen, Sparksrv, Comfoo |
Family | |
Botnet | Wimmie |
Malware | |
Exploit kit | |
Distribution vector | Spear phishing |
Vulnerability | CVE-2010-3333 |
BeginYear | 2011 |
EndYear | |
Target | Aerospace, Energy, Engineering, Shipping, Military research, Tibetan activists |
Origin | |
Group/Activity | |
Relations | Sibling of: Parent of: |
Introduction
Publications
Author | Editor | Year | |
---|---|---|---|
Inside an APT campaign with multiple targets in India and Japan | Trend Micro | 2012 |