Difference between revisions of "Ramnit goes social"

From Botnets.fr
Jump to navigation Jump to search
m (1 revision imported)
 
Line 1: Line 1:
{{Publication
{{Publication
|Image=
|Botnet=Ramnit,
|Legend=
|Malware=Ramnit (bot),
|ExploitKit=,
|CCProtocol=,
|Operation=,
|Year=2012
|Date=2012-01-05
|Editor=Seculert
|Link=http://blog.seculert.com/2012/01/ramnit-goes-social.html
|Author=,
|Type=Blogpost
|Abstract=Discovered in April 2010, the Microsoft Malware Protection Center (MMPC) described Ramnit as “a multi-component malware family which infects Windows executable as well as HTML files”, “stealing sensitive information such as stored FTP credentials and browser cookies”. In July 2011 a Symantec report [PDF] estimated that Ramnit worm variants accounted for 17.3 percent of all new malicious software infections.
|Document=
|Document=
|Licence=
|Licence=
|Video=
|Video=
|Link=http://blog.seculert.com/2012/01/ramnit-goes-social.html blog.seculert.com
|Author=,
|NomRevue=Seculert blog
|NomRevue=Seculert blog
|Date=2012-01-05
|Editor=Seculert
|Year=2012
|ISBN=
|ISBN=
|Page=
|Page=
|Abstract=Discovered in April 2010, the Microsoft Malware Protection Center (MMPC) described Ramnit as “a multi-component malware family which infects Windows executable as well as HTML files”, “stealing sensitive information such as stored FTP credentials and browser cookies”. In July 2011 a Symantec report [PDF] estimated that Ramnit worm variants accounted for 17.3 percent of all new malicious software infections.
|Keyword=,
|Botnet=Ramnit,
|Malware=Ramnit (bot),
|ExploitKit=,
|CCProtocol=,
|Operation=,
|Keyword=,  
}}
}}

Latest revision as of 20:50, 20 August 2015

(Publication) Google search: [1]

Ramnit goes social
Botnet Ramnit
Malware Ramnit (bot)
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 2012-01-05
Editor/Conference Seculert
Link http://blog.seculert.com/2012/01/ramnit-goes-social.html (Archive copy)
Author
Type Blogpost

Abstract

Discovered in April 2010, the Microsoft Malware Protection Center (MMPC) described Ramnit as “a multi-component malware family which infects Windows executable as well as HTML files”, “stealing sensitive information such as stored FTP credentials and browser cookies”. In July 2011 a Symantec report [PDF] estimated that Ramnit worm variants accounted for 17.3 percent of all new malicious software infections.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1220,
   editor = {Seculert},
   author = {},
   title = {Ramnit goes social},
   date = {05},
   month = Jan,
   year = {2012},
   howpublished = {\url{http://blog.seculert.com/2012/01/ramnit-goes-social.html}},
 }