Difference between revisions of "McAfee Labs threat advisory : W32.Pinkslipbot"

From Botnets.fr
Jump to navigation Jump to search
m (1 revision imported)
 
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
{{Publication
{{Publication
|Image=
|Botnet=Akbot,
|Legend=
|Malware=Akbot_(bot),
|Document=
|CCProtocol=,
|Licence=
|Operation=,
|Video=
|Year=2012
|Link=https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/22000/PD22960/en_US/McAfee-Labs-ThreatAdvisory-Pinkslipbot.pdf mcafee.com(Pdf)
|Author=,  
|NomRevue=Threat Advisory
|Date=February 22, 2012
|Date=February 22, 2012
|Editor=McAfee
|Editor=McAfee
|Year=2012
|Link=https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/22000/PD22960/en_US/McAfee-Labs-ThreatAdvisory-Pinkslipbot.pdf
|ISBN=
|Author=,
|Page=
|Type=Tech report
|Abstract=The W32/Pinkslipbot worm is capable of spreading over network shares, downloading files, and updating its  
|Abstract=The W32/Pinkslipbot worm is capable of spreading over network shares, downloading files, and updating its software. Additionally, it is capable of receiving back door command from its IRC command and control center. It attempts to steal user information and upload it to FTP sites.  
software. Additionally, it is capable of receiving back door command from its IRC command and control  
center. It attempts to steal user information and upload it to FTP sites.  
Aliases:
Aliases:
• Qakbot
• Qakbot
Line 21: Line 16:
• Qbot
• Qbot
Detailed information about the worm, its propagation, and mitigation are in the following sections:
Detailed information about the worm, its propagation, and mitigation are in the following sections:
|Botnet=Akbot,
|Document=
|Malware=Akbot_(bot),
|Licence=
|CCProtocol=,
|Video=
|Operation=,
|NomRevue=Threat Advisory
|Keyword=,  
|ISBN=
|Page=
|Keyword=,
}}
}}

Latest revision as of 00:32, 22 March 2016

(Publication) Google search: [1]

McAfee Labs threat advisory : W32.Pinkslipbot
Botnet Akbot
Malware Akbot_(bot)
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / February 22, 2012
Editor/Conference McAfee
Link https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT DOCUMENTATION/22000/PD22960/en US/McAfee-Labs-ThreatAdvisory-Pinkslipbot.pdf (Archive copy)
Author
Type Tech report

Abstract

The W32/Pinkslipbot worm is capable of spreading over network shares, downloading files, and updating its software. Additionally, it is capable of receiving back door command from its IRC command and control center. It attempts to steal user information and upload it to FTP sites.

Aliases: • Qakbot • Akbot • Qbot Detailed information about the worm, its propagation, and mitigation are in the following sections:

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR914,
   editor = {McAfee},
   author = {},
   title = {McAfee Labs threat advisory : W32.Pinkslipbot},
   date = {22},
   month = Feb,
   year = {2012},
   howpublished = {\url{https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/22000/PD22960/en_US/McAfee-Labs-ThreatAdvisory-Pinkslipbot.pdf}},
 }