Difference between revisions of "Smartcard vulnerabilities in modern banking malware"

From Botnets.fr
Jump to navigation Jump to search
m (1 revision imported)
 
Line 1: Line 1:
{{Publication
{{Publication
|Image=
|Legend=Smartcard_vulnerabilities_in_modern_banking_malware.png
|Legend=Smartcard_vulnerabilities_in_modern_banking_malware.png
|Botnet=Carberp, Ranbyus,
|Malware=,
|CCProtocol=,
|Operation=,
|Year=2012
|Date=June 6, 2012
|Editor=ESET
|Link=http://blog.eset.com/2012/06/05/smartcard-vulnerabilities-in-modern-banking-malware
|Author=Aleksandr Matrosov,
|Type=Blogpost
|Abstract=Last week an epic security event took place in Russia – the PHDays’2012 conference. This event started last year as the first conference in Russia for security researchers focusing on deeply technical speakers – all the videos translated into English are already online here. 
This year, ESET Canada's Pierre-Marc Bureau presented a workshop on “Win32/Georbot. Understanding a malware and automating its analysis”, about reverse engineering the Georbot trojan. And I and my colleague Eugene Rodionov presented the results of our research into “Smartcard vulnerabilities in modern banking malware”.
Our presentation starts with a consideration of the evolution of the Carberp family of banking malware (we already discussed this in our CARO presentation in May).
|Document=
|Document=
|Licence=
|Licence=
|Video=
|Video=
|Link=http://blog.eset.com/2012/06/05/smartcard-vulnerabilities-in-modern-banking-malware blog.eset.com
|Author=Aleksandr Matrosov,
|NomRevue=ESET Threat Blog
|NomRevue=ESET Threat Blog
|Date=June 6, 2012
|Editor=ESET
|Year=2012
|ISBN=
|ISBN=
|Page=
|Page=
|Abstract=Last week an epic security event took place in Russia – the PHDays’2012 conference. This event started last year as the first conference in Russia for security researchers focusing on deeply technical speakers – all the videos translated into English are already online here. 
|Keyword=,
 
This year, ESET Canada's Pierre-Marc Bureau presented a workshop on “Win32/Georbot. Understanding a malware and automating its analysis”, about reverse engineering the Georbot trojan. And I and my colleague Eugene Rodionov presented the results of our research into “Smartcard vulnerabilities in modern banking malware”.
 
Our presentation starts with a consideration of the evolution of the Carberp family of banking malware (we already discussed this in our CARO presentation in May). 
|Botnet=Carberp, Ranbyus,
|Malware=,
|CCProtocol=,
|Operation=,
|Keyword=,  
}}
}}

Latest revision as of 20:55, 20 August 2015

(Publication) Google search: [1]

Smartcard vulnerabilities in modern banking malware
Botnet Carberp, Ranbyus
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / June 6, 2012
Editor/Conference ESET
Link http://blog.eset.com/2012/06/05/smartcard-vulnerabilities-in-modern-banking-malware (Archive copy)
Author Aleksandr Matrosov
Type Blogpost

Abstract

Last week an epic security event took place in Russia – the PHDays’2012 conference. This event started last year as the first conference in Russia for security researchers focusing on deeply technical speakers – all the videos translated into English are already online here.

This year, ESET Canada's Pierre-Marc Bureau presented a workshop on “Win32/Georbot. Understanding a malware and automating its analysis”, about reverse engineering the Georbot trojan. And I and my colleague Eugene Rodionov presented the results of our research into “Smartcard vulnerabilities in modern banking malware”.

Our presentation starts with a consideration of the evolution of the Carberp family of banking malware (we already discussed this in our CARO presentation in May).

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1024,
   editor = {ESET},
   author = {Aleksandr Matrosov},
   title = {Smartcard vulnerabilities in modern banking malware},
   date = {06},
   month = Jun,
   year = {2012},
   howpublished = {\url{http://blog.eset.com/2012/06/05/smartcard-vulnerabilities-in-modern-banking-malware}},
 }