Difference between revisions of "Malware discovered developed with Google's "Go" programming language"
Jump to navigation
Jump to search
m (Text replacement - " www.securityweek.com" to "") |
|||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
{{Publication | {{Publication | ||
|Link=http://www.securityweek.com/malware-discovered-developed-googles-go-programming-language | |Link=http://www.securityweek.com/malware-discovered-developed-googles-go-programming-language | ||
|Author=Steve Ragan | |Author=Steve Ragan | ||
|NomRevue=Security Week | |NomRevue=Security Week |
Latest revision as of 22:48, 5 August 2015
(Publication) Google search: [1]
Malware discovered developed with Google's "Go" programming language | |
---|---|
Botnet | Encriyoko |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-09-22 |
Editor/Conference | Wired Business Media |
Link | http://www.securityweek.com/malware-discovered-developed-googles-go-programming-language (Archive copy) |
Author | Steve Ragan |
Type |
Abstract
“ Symantec captured a sample of what they’re calling Encriyoko recently, which has elements coded with Go. The malware itself is presented as a rooting tool for the Galaxy Nexus, and if users were to install it, the .exe will drop two files on the system.
According to the researchers who examined the Trojan, the two files instigate two different attacks on a compromised host once installed.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1171, editor = {Wired Business Media}, author = {Steve Ragan}, title = {Malware discovered developed with Google's "Go" programming language}, date = {22}, month = Sep, year = {2012}, howpublished = {\url{http://www.securityweek.com/malware-discovered-developed-googles-go-programming-language}}, }