Difference between revisions of "Smartcard vulnerabilities in modern banking malware"
m (Remplacement du texte — « Eset » par « ESET ») |
|||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
{{Publication | {{Publication | ||
|Legend=Smartcard_vulnerabilities_in_modern_banking_malware.png | |Legend=Smartcard_vulnerabilities_in_modern_banking_malware.png | ||
|Botnet=Carberp, Ranbyus, | |||
|Malware=, | |||
|CCProtocol=, | |||
|Operation=, | |||
|Year=2012 | |||
|Date=June 6, 2012 | |||
|Editor=ESET | |||
|Link=http://blog.eset.com/2012/06/05/smartcard-vulnerabilities-in-modern-banking-malware | |||
|Author=Aleksandr Matrosov, | |||
|Type=Blogpost | |||
|Abstract=Last week an epic security event took place in Russia – the PHDays’2012 conference. This event started last year as the first conference in Russia for security researchers focusing on deeply technical speakers – all the videos translated into English are already online here. | |||
This year, ESET Canada's Pierre-Marc Bureau presented a workshop on “Win32/Georbot. Understanding a malware and automating its analysis”, about reverse engineering the Georbot trojan. And I and my colleague Eugene Rodionov presented the results of our research into “Smartcard vulnerabilities in modern banking malware”. | |||
Our presentation starts with a consideration of the evolution of the Carberp family of banking malware (we already discussed this in our CARO presentation in May). | |||
|Document= | |Document= | ||
|Licence= | |Licence= | ||
|Video= | |Video= | ||
|NomRevue=ESET Threat Blog | |NomRevue=ESET Threat Blog | ||
|ISBN= | |ISBN= | ||
|Page= | |Page= | ||
|Keyword=, | |||
|Keyword=, | |||
}} | }} |
Latest revision as of 20:55, 20 August 2015
(Publication) Google search: [1]
Smartcard vulnerabilities in modern banking malware | |
---|---|
Botnet | Carberp, Ranbyus |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / June 6, 2012 |
Editor/Conference | ESET |
Link | http://blog.eset.com/2012/06/05/smartcard-vulnerabilities-in-modern-banking-malware (Archive copy) |
Author | Aleksandr Matrosov |
Type | Blogpost |
Abstract
“ Last week an epic security event took place in Russia – the PHDays’2012 conference. This event started last year as the first conference in Russia for security researchers focusing on deeply technical speakers – all the videos translated into English are already online here.
This year, ESET Canada's Pierre-Marc Bureau presented a workshop on “Win32/Georbot. Understanding a malware and automating its analysis”, about reverse engineering the Georbot trojan. And I and my colleague Eugene Rodionov presented the results of our research into “Smartcard vulnerabilities in modern banking malware”.
Our presentation starts with a consideration of the evolution of the Carberp family of banking malware (we already discussed this in our CARO presentation in May).
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1024, editor = {ESET}, author = {Aleksandr Matrosov}, title = {Smartcard vulnerabilities in modern banking malware}, date = {06}, month = Jun, year = {2012}, howpublished = {\url{http://blog.eset.com/2012/06/05/smartcard-vulnerabilities-in-modern-banking-malware}}, }