MSRT April 2014 – Ramdo

From Botnets.fr
Revision as of 16:33, 7 August 2015 by Eric.freyssinet (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

MSRT April 2014 – Ramdo
Botnet Ramdo, Beebone
Malware
Botnet/malware group
Exploit kits
Services
Feature Domain generation algorithm
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2014 / 2014-04-08
Editor/Conference Microsoft
Link http://blogs.technet.com/b/mmpc/archive/2014/04/08/msrt-april-2014-ramdo.aspx (Archive copy)
Author Shawn Wang
Type Blogpost

Abstract

Compared to other big families, Win32/Ramdo’s impact is relatively small in terms of the number of infected machines. However, when one of our customers gets infected with it, the impact is big on that machine: bandwidth and CPU power are exhausted to generate profit for the malware authors, and exploits can be deployed to install additional malware.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2014BFR4562,
   editor = {Microsoft},
   author = {Shawn Wang},
   title = {MSRT April 2014 – Ramdo},
   date = {08},
   month = Apr,
   year = {2014},
   howpublished = {\url{http://blogs.technet.com/b/mmpc/archive/2014/04/08/msrt-april-2014-ramdo.aspx}},
 }