Difference between revisions of "McAfee Labs threat advisory : W32.Pinkslipbot"
Jump to navigation
Jump to search
m (1 revision imported) |
|||
Line 1: | Line 1: | ||
{{Publication | {{Publication | ||
| | |Botnet=Akbot, | ||
| | |Malware=Akbot_(bot), | ||
| | |CCProtocol=, | ||
| | |Operation=, | ||
|Year=2012 | |||
| | |||
|Date=February 22, 2012 | |Date=February 22, 2012 | ||
|Editor=McAfee | |Editor=McAfee | ||
| | |Link=https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/22000/PD22960/en_US/McAfee-Labs-ThreatAdvisory-Pinkslipbot.pdf | ||
| | |Author=, | ||
|Abstract=The W32/Pinkslipbot worm is capable of spreading over network shares, downloading files, and updating its | |Abstract=The W32/Pinkslipbot worm is capable of spreading over network shares, downloading files, and updating its | ||
software. Additionally, it is capable of receiving back door command from its IRC command and control | software. Additionally, it is capable of receiving back door command from its IRC command and control | ||
Line 21: | Line 17: | ||
• Qbot | • Qbot | ||
Detailed information about the worm, its propagation, and mitigation are in the following sections: | Detailed information about the worm, its propagation, and mitigation are in the following sections: | ||
| | |Document= | ||
| | |Licence= | ||
| | |Video= | ||
| | |NomRevue=Threat Advisory | ||
|Keyword=, | |ISBN= | ||
|Page= | |||
|Keyword=, | |||
}} | }} |
Revision as of 00:31, 22 March 2016
(Publication) Google search: [1]
McAfee Labs threat advisory : W32.Pinkslipbot | |
---|---|
Botnet | Akbot |
Malware | Akbot_(bot) |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / February 22, 2012 |
Editor/Conference | McAfee |
Link | https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT DOCUMENTATION/22000/PD22960/en US/McAfee-Labs-ThreatAdvisory-Pinkslipbot.pdf (Archive copy) |
Author | |
Type |
Abstract
“ The W32/Pinkslipbot worm is capable of spreading over network shares, downloading files, and updating its
software. Additionally, it is capable of receiving back door command from its IRC command and control center. It attempts to steal user information and upload it to FTP sites. Aliases: • Qakbot • Akbot • Qbot Detailed information about the worm, its propagation, and mitigation are in the following sections:
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR914, editor = {McAfee}, author = {}, title = {McAfee Labs threat advisory : W32.Pinkslipbot}, date = {22}, month = Feb, year = {2012}, howpublished = {\url{https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/22000/PD22960/en_US/McAfee-Labs-ThreatAdvisory-Pinkslipbot.pdf}}, }