More Flame/Skywiper CNC behavior uncovered
Revision as of 21:50, 5 August 2015 by Eric.freyssinet (talk | contribs) (Text replacement - " blog.fireeye.com" to "")
(Publication) Google search: [1]
More Flame/Skywiper CNC behavior uncovered | |
---|---|
Botnet | Flame, SKyWIper |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 26 juin 2012 |
Editor/Conference | FireEye |
Link | http://blog.fireeye.com/research/2012/06/flame-skywiper-cnc-update.html (Archive copy) |
Author | Ali Islam |
Type |
Abstract
“ When news of the Flame/SkyWiper malware hit the headlines last month, the world went into a frenzy. Flame was immediately hailed as the world’s most sophisticated malware. While security researchers will surely be talking about Flame for years to come, FireEye has since made another discovery regarding Flame’s command and control (CNC) behavior: it appears that the Flamer/sKyWIper malware’s callback has recently changed.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1055, editor = {FireEye}, author = {Ali Islam}, title = {More Flame/Skywiper CNC behavior uncovered}, date = {Error: Invalid time.}, month = Error: Invalid time., year = {2012}, howpublished = {\url{http://blog.fireeye.com/research/2012/06/flame-skywiper-cnc-update.html}}, }