Difference between revisions of "Researchers: Bredolab still lurking, though severely injured"

From Botnets.fr
Jump to navigation Jump to search
m (1 revision imported)
 
Line 1: Line 1:
{{Publication
{{Publication
|Link=http://www.thetechherald.com/articles/Researchers-Bredolab-still-lurking-though-severely-injured-(Update-3)/11757/ www.thetechherald.com
|Author=Steve Ragan
|NomRevue=The Tech Herald
|Date=2010-10-28
|Year=2010
|Botnet=Bredolab, TDSS, TDL3
|Botnet=Bredolab, TDSS, TDL3
|Malware=Alureon, TDL3, TDSS
|Malware=Alureon, TDL3, TDSS
|Year=2010
|Date=2010-10-28
|Link=http://www.thetechherald.com/articles/Researchers-Bredolab-still-lurking-though-severely-injured-(Update-3)/11757/
|Author=Steve Ragan
|Abstract=Mushtaq discovered that while 143 C&C servers were indeed taken offline, a single C&C in Russia (proobizz.cc) has remained. This C&C, and the bots communicating with it, are carrying out the last command issued to them faithfully. The command instructed them to download various types of Malware, including TDSS.
|Abstract=Mushtaq discovered that while 143 C&C servers were indeed taken offline, a single C&C in Russia (proobizz.cc) has remained. This C&C, and the bots communicating with it, are carrying out the last command issued to them faithfully. The command instructed them to download various types of Malware, including TDSS.
|NomRevue=The Tech Herald
}}
}}

Latest revision as of 00:42, 31 July 2015

(Publication) Google search: [1]

Researchers: Bredolab still lurking, though severely injured
Botnet Bredolab, TDSS, TDL3
Malware Alureon, TDL3, TDSS
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2010 / 2010-10-28
Editor/Conference
Link http://www.thetechherald.com/articles/Researchers-Bredolab-still-lurking-though-severely-injured-(Update-3)/11757/ (Archive copy)
Author Steve Ragan
Type

Abstract

Mushtaq discovered that while 143 C&C servers were indeed taken offline, a single C&C in Russia (proobizz.cc) has remained. This C&C, and the bots communicating with it, are carrying out the last command issued to them faithfully. The command instructed them to download various types of Malware, including TDSS.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2010BFR862,
   editor = {},
   author = {Steve Ragan},
   title = {Researchers: Bredolab still lurking, though severely injured},
   date = {28},
   month = Oct,
   year = {2010},
   howpublished = {\url{http://www.thetechherald.com/articles/Researchers-Bredolab-still-lurking-though-severely-injured-(Update-3)/11757/}},
 }