Difference between revisions of "Nitol DDoS botnet discovered in China"

From Botnets.fr
Jump to navigation Jump to search
m (1 revision imported)
m (Text replacement - "/ www." to "/ |Site=www.")
 
Line 5: Line 5:
|Licence=
|Licence=
|Video=
|Video=
|Link=http://www.infosecurity-magazine.com/view/25296/nitol-ddos-botnet-discovered-in-china/ www.infosecurity-magazine.com
|Link=http://www.infosecurity-magazine.com/view/25296/nitol-ddos-botnet-discovered-in-china/
|Site=www.infosecurity-magazine.com
|Author=Anonyme,  
|Author=Anonyme,  
|NomRevue=Infosecurity magazine
|NomRevue=Infosecurity magazine

Latest revision as of 12:45, 31 July 2015

(Publication) Google search: [1]

Nitol DDoS botnet discovered in China
Botnet Nitol
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 20 avril 2012
Editor/Conference Reed Exhibitions
Link http://www.infosecurity-magazine.com/view/25296/nitol-ddos-botnet-discovered-in-china/ (Archive copy)
Author Anonyme
Type

Abstract

McAfee Labs has uncovered a distributed denial of service (DDoS) botnet, dubbed Nitol, operating in China.

The Nitol trojan that is installed on computers is written in Visual C++ with a lot of bugs in the code, apparently written by an untrained programmer, McAfee researcher Itai Liba explained in a blog. The samples examined by Liba and other McAfee researchers were not packed and easy to reverse engineer. The botnet itself is relatively small and not widely known.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1002,
   editor = {Reed Exhibitions},
   author = {Anonyme},
   title = {Nitol DDoS botnet discovered in China},
   date = {Error: Invalid time.},
   month = Error: Invalid time.,
   year = {2012},
   howpublished = {\url{http://www.infosecurity-magazine.com/view/25296/nitol-ddos-botnet-discovered-in-china/}},
 }