MSRT April 2014 – Ramdo
Jump to navigation
Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
(Publication) Google search: [1]
MSRT April 2014 – Ramdo | |
---|---|
Botnet | Ramdo, Beebone |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | Domain generation algorithm |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2014 / 2014-04-08 |
Editor/Conference | Microsoft |
Link | http://blogs.technet.com/b/mmpc/archive/2014/04/08/msrt-april-2014-ramdo.aspx (Archive copy) |
Author | Shawn Wang |
Type | Blogpost |
Abstract
“ Compared to other big families, Win32/Ramdo’s impact is relatively small in terms of the number of infected machines. However, when one of our customers gets infected with it, the impact is big on that machine: bandwidth and CPU power are exhausted to generate profit for the malware authors, and exploits can be deployed to install additional malware.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2014BFR4562, editor = {Microsoft}, author = {Shawn Wang}, title = {MSRT April 2014 – Ramdo}, date = {08}, month = Apr, year = {2014}, howpublished = {\url{http://blogs.technet.com/b/mmpc/archive/2014/04/08/msrt-april-2014-ramdo.aspx}}, }