TDL4 - Top Bot
Revision as of 18:07, 7 February 2015 by Eric.freyssinet (talk | contribs) (Text replacement - " www.securelist.com" to "")
(Publication) Google search: [1]
TDL4 - Top Bot | |
---|---|
Botnet | TDL-4 |
Malware | TDL-4 (bot) |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | HTTP, P2P |
Date | 2011 / 2011-06-27 |
Editor/Conference | Kaspersky lab |
Link | http://www.securelist.com/en/analysis/204792180/TDL4 Top Bot (Archive copy) |
Author | Sergey Golovanov, Igor Soumenkov |
Type |
Abstract
“ The malware detected by Kaspersky Anti-Virus as TDSS is the most sophisticated threat today. TDSS uses a range of methods to evade signature, heuristic, and proactive detection, and uses encryption to facilitate communication between its bots and the botnet command and control center. TDSS also has a powerful rootkit component, which allows it to conceal the presence of any other types of malware in the system.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2011BFR885, editor = {Kaspersky lab}, author = {Sergey Golovanov, Igor Soumenkov}, title = {TDL4 - Top Bot}, date = {27}, month = Jun, year = {2011}, howpublished = {\url{http://www.securelist.com/en/analysis/204792180/TDL4_Top_Bot}}, }