Search results

Jump to navigation Jump to search
Results 41 – 61 of 132
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  • ...blicly available information. That helped our understanding of where the C&C servers were located and how they were registered. ...new information that was collected during forensic analysis of the Flame C&C servers. This investigation was done in partnership with Symantec, ITU-IMPA
    2 KB (272 words) - 18:57, 7 February 2015
  • ...jan horse. It receives and executes commands from a command-and-control (C&C) server and it gathers information from the compromised computer including
    658 bytes (88 words) - 21:43, 5 August 2015
  • |Programming language=C, ASM
    130 bytes (14 words) - 07:04, 15 July 2021
  • ...alware that appears to be using Evernote as a communication and control (C&C) server. Detected as BKDR_VERNOT.A, the malware attempts to connect to Ever
    721 bytes (100 words) - 12:30, 3 August 2015
  • ...ctually the “main” function that implements all the logics of contacting C&C servers, receiving additional payload modules and executing them. The most ...ns and user-written code, except the biggest slice that contains most of C&C interaction code.
    2 KB (256 words) - 18:48, 8 February 2015
  • ...d computer. The Flamer attackers were still in control of at least a few C&C servers, which allowed them to communicate with a specific set of compromis ...ontrol server to acquire additional commands. Following the request, the C&C server shipped them a file named browse32.ocx. This file can be summarized
    2 KB (281 words) - 21:47, 5 August 2015
  • ...campaigns. The attackers behind this campaign maintain a diverse set of C&C infrastructure and leverages anonymity tools to obfuscate
    752 bytes (105 words) - 03:44, 19 August 2015
  • ...binaries and the amount of logging information that is sent back to the C&C.
    1 KB (171 words) - 16:27, 7 February 2015
  • ...ration, which disabled the botnet and its backup infrastructure from the C&C.
    1 KB (232 words) - 19:00, 7 February 2015
  • |Link=http://c-apt-ure.blogspot.fr/2012/06/introducing-ponmocup-finder.html c-apt-ure.blogspot.fr |NomRevue=c-APT-ure
    691 bytes (95 words) - 16:27, 7 February 2015
  • ...( ? behind Reveton) is using it to spread Reveton which dress from its C&C with a new "Autumn Collection" and is targeting at least 4 new countries :
    708 bytes (98 words) - 19:00, 7 February 2015
  • ...alware is a ZeuS version 3 variant that uses peer-to-peer as its primary C&C channel and only resorts to the DGAgenerated domains if it fails
    1 KB (202 words) - 22:58, 5 August 2015
  • ...nfect a machine, download the necessary data from a command and control (C&C) server to create spam email messages, and then send the spam out using the ...its droppers, how its bootkit functions and how it communicates with its C&C server.
    1 KB (216 words) - 22:51, 5 August 2015
  • ...up in the last couple weeks is called ZeroLocker. There's indication the C&C configuration contains some errors which would prevent successful decryptio
    720 bytes (105 words) - 18:47, 8 February 2015
  • ...r that creates a Peer-to-Peer (P2P) network of infected computers (using C&C, for instance), and includes a nasty list of payloads, as well as unique me
    761 bytes (103 words) - 01:11, 31 July 2015
  • ...ted machines failed to uncover the characteristic communicatation with a C&C. After closer examination it appeared that the sample was probably a new ve
    724 bytes (112 words) - 22:52, 5 August 2015
  • ...this family (derived from the hostname of one of the initially observed C&C servers.)
    811 bytes (120 words) - 21:30, 5 August 2015
  • ...on the victim host and then sends system/web browser details back to the C&C. The botmasters can use this setup to “spoof” banking requests as the u
    753 bytes (108 words) - 18:49, 8 February 2015
  • ...quest, encrypts the requested data, and sends it to a command & control (C&C) server.
    838 bytes (115 words) - 22:49, 5 August 2015
  • * Load [[feature::Advertising|advertising]] (called AdSense in C&C)
    882 bytes (109 words) - 15:42, 8 August 2015

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)