Property:Description

From Botnets.fr
Jump to navigation Jump to search

This is a property of type Text.

Showing 38 pages using this property.
H
Using the same principle as DGA, but this time it is the ID of the resource to access that is automatically generated, such as a twitter handle  +
Part of the Pharming process  +
I
Internet of Things assets (cameras, home appliances, ...)  +
L
DDoS feature  +
Block access to regular functions on the computer, filling up the screen and not allowing the user to access to anything else.  +
Logging information is sent to the C&C  +
M
Popular IRC software, sometimes used as basis for IRC malware construction.  +
Distribution du botnet/malware par MSN  +
Mailslots are an IPC mechanism allowing multiple clients to send messages to a server.  +
Memory scrapping (for passwords, credit card data,...)  +
Monitor microphone (sound) activity  +
P
Theft of POP3 logins and passwords  +
Documented feature where the malware contacts the command and control mechanism to ping it and expect commands (all botnets have that feature, thus it is interesting to mention it if it is documented in one of the attached publications)  +
Point-of-sale botnets: target credit card and other personal data on POS terminals.  +
Uses a polymorphic engine to mutate while keeping the original algorithm intact  +
Show a pop-up message on the victims' computers  +
Other premium rate services (such as pay per view videos, games...).  +
Create an infrastructure to proxy attacks, command a botnet through a first level of proxies.  +
R
Remote administration trojans  +
By calling the AddPrintProcessor API  +
Distribution via removable drives  +
Exécution de commandes  +
S
SOCKS proxy  +
Grabbing of SPDY session content.  +
Automatic scan and attack of servers, mostly webservers, using SQL injections, known vulnerabilities, brute force, etc.  +
The code that operates the mutation is on a dedicated server.  +
Propagates through shared drive / network share  +
Distribution par les réseaux sociaux  +
Involves RATs and Rootkits  +
Modification of the browser's start page  +
Store data in NTFS Alternate data streams  +
U
Distribution du botnet/malware par périphérique (clé) USB  +
Désinstallation de malwares non affiliés ou plus exploités  +
Mise à jour du malware grâce au botnet  +
V
Detection of virtual environments or methods to circumvent automated analyses in sandboxes.  +
W
Détournement de la machine victime comme serveur Web  +
World of Warcraft password theft  +
X
XOR encoding of data for storage and/or exfiltration  +