Difference between revisions of "McAfee Labs threat advisory : W32.Pinkslipbot"
Jump to navigation
Jump to search
Line 9: | Line 9: | ||
|Link=https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/22000/PD22960/en_US/McAfee-Labs-ThreatAdvisory-Pinkslipbot.pdf | |Link=https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/22000/PD22960/en_US/McAfee-Labs-ThreatAdvisory-Pinkslipbot.pdf | ||
|Author=, | |Author=, | ||
|Abstract=The W32/Pinkslipbot worm is capable of spreading over network shares, downloading files, and updating its | |Type=Tech report | ||
software. Additionally, it is capable of receiving back door command from its IRC command and control | |Abstract=The W32/Pinkslipbot worm is capable of spreading over network shares, downloading files, and updating its software. Additionally, it is capable of receiving back door command from its IRC command and control center. It attempts to steal user information and upload it to FTP sites. | ||
center. It attempts to steal user information and upload it to FTP sites. | |||
Aliases: | Aliases: | ||
• Qakbot | • Qakbot |
Latest revision as of 00:32, 22 March 2016
(Publication) Google search: [1]
McAfee Labs threat advisory : W32.Pinkslipbot | |
---|---|
Botnet | Akbot |
Malware | Akbot_(bot) |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / February 22, 2012 |
Editor/Conference | McAfee |
Link | https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT DOCUMENTATION/22000/PD22960/en US/McAfee-Labs-ThreatAdvisory-Pinkslipbot.pdf (Archive copy) |
Author | |
Type | Tech report |
Abstract
“ The W32/Pinkslipbot worm is capable of spreading over network shares, downloading files, and updating its software. Additionally, it is capable of receiving back door command from its IRC command and control center. It attempts to steal user information and upload it to FTP sites.
Aliases: • Qakbot • Akbot • Qbot Detailed information about the worm, its propagation, and mitigation are in the following sections:
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR914, editor = {McAfee}, author = {}, title = {McAfee Labs threat advisory : W32.Pinkslipbot}, date = {22}, month = Feb, year = {2012}, howpublished = {\url{https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/22000/PD22960/en_US/McAfee-Labs-ThreatAdvisory-Pinkslipbot.pdf}}, }