Difference between revisions of "Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-mode"

From Botnets.fr
Jump to navigation Jump to search
 
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
{{Publication
{{Publication
|Link=http://nakedsecurity.sophos.com/2012/06/06/zeroaccess-rootkit-usermode/ nakedsecurity.sophos.com
|Botnet=ZeroAccess
|Year=2012
|Date=2012-06-06
|Editor=Sophos Labs
|Link=http://nakedsecurity.sophos.com/2012/06/06/zeroaccess-rootkit-usermode/
|Author=James Wyke
|Author=James Wyke
|NomRevue=Naked Security
|Type=Blogpost
|Date=6 juin 2012
|Editor=Sophos Labs
|Year=2012
|Botnet=ZeroAccess
|Abstract=SophosLabs has been monitoring a new strain of the infamous ZeroAccess rootkit that has been hitting the internet over the last few weeks.
|Abstract=SophosLabs has been monitoring a new strain of the infamous ZeroAccess rootkit that has been hitting the internet over the last few weeks.


ZeroAccess is a sophisticated kernel-mode rootkit that enslaves victim PCs, adding them to a peer-to-peer botnet from which they receive commands to download other malware. The rootkit has undergone several revisions since its inception but this new version represents a major shift in strategy.
ZeroAccess is a sophisticated kernel-mode rootkit that enslaves victim PCs, adding them to a peer-to-peer botnet from which they receive commands to download other malware. The rootkit has undergone several revisions since its inception but this new version represents a major shift in strategy.
|NomRevue=Naked Security
}}
}}

Latest revision as of 02:04, 1 August 2015

(Publication) Google search: [1]

Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-mode
Botnet ZeroAccess
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 2012-06-06
Editor/Conference Sophos Labs
Link http://nakedsecurity.sophos.com/2012/06/06/zeroaccess-rootkit-usermode/ (Archive copy)
Author James Wyke
Type Blogpost

Abstract

SophosLabs has been monitoring a new strain of the infamous ZeroAccess rootkit that has been hitting the internet over the last few weeks.

ZeroAccess is a sophisticated kernel-mode rootkit that enslaves victim PCs, adding them to a peer-to-peer botnet from which they receive commands to download other malware. The rootkit has undergone several revisions since its inception but this new version represents a major shift in strategy.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1168,
   editor = {Sophos Labs},
   author = {James Wyke},
   title = {Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-mode},
   date = {06},
   month = Jun,
   year = {2012},
   howpublished = {\url{http://nakedsecurity.sophos.com/2012/06/06/zeroaccess-rootkit-usermode/}},
 }