Difference between revisions of "Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-mode"
Jump to navigation
Jump to search
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
{{Publication | {{Publication | ||
|Link=http://nakedsecurity.sophos.com/2012/06/06/zeroaccess-rootkit-usermode/ | |Botnet=ZeroAccess | ||
|Year=2012 | |||
|Date=2012-06-06 | |||
|Editor=Sophos Labs | |||
|Link=http://nakedsecurity.sophos.com/2012/06/06/zeroaccess-rootkit-usermode/ | |||
|Author=James Wyke | |Author=James Wyke | ||
| | |Type=Blogpost | ||
|Abstract=SophosLabs has been monitoring a new strain of the infamous ZeroAccess rootkit that has been hitting the internet over the last few weeks. | |Abstract=SophosLabs has been monitoring a new strain of the infamous ZeroAccess rootkit that has been hitting the internet over the last few weeks. | ||
ZeroAccess is a sophisticated kernel-mode rootkit that enslaves victim PCs, adding them to a peer-to-peer botnet from which they receive commands to download other malware. The rootkit has undergone several revisions since its inception but this new version represents a major shift in strategy. | ZeroAccess is a sophisticated kernel-mode rootkit that enslaves victim PCs, adding them to a peer-to-peer botnet from which they receive commands to download other malware. The rootkit has undergone several revisions since its inception but this new version represents a major shift in strategy. | ||
|NomRevue=Naked Security | |||
}} | }} |
Latest revision as of 02:04, 1 August 2015
(Publication) Google search: [1]
Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-mode | |
---|---|
Botnet | ZeroAccess |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-06-06 |
Editor/Conference | Sophos Labs |
Link | http://nakedsecurity.sophos.com/2012/06/06/zeroaccess-rootkit-usermode/ (Archive copy) |
Author | James Wyke |
Type | Blogpost |
Abstract
“ SophosLabs has been monitoring a new strain of the infamous ZeroAccess rootkit that has been hitting the internet over the last few weeks.
ZeroAccess is a sophisticated kernel-mode rootkit that enslaves victim PCs, adding them to a peer-to-peer botnet from which they receive commands to download other malware. The rootkit has undergone several revisions since its inception but this new version represents a major shift in strategy.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1168, editor = {Sophos Labs}, author = {James Wyke}, title = {Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-mode}, date = {06}, month = Jun, year = {2012}, howpublished = {\url{http://nakedsecurity.sophos.com/2012/06/06/zeroaccess-rootkit-usermode/}}, }