Difference between revisions of "Trojan.ZeroAccess infection analysis"

From Botnets.fr
Jump to navigation Jump to search
 
m (Text replacement - " www.symantec.com" to "")
 
(One intermediate revision by the same user not shown)
Line 5: Line 5:
|Licence=
|Licence=
|Video=
|Video=
|Link=http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/trojan_zeroaccess_infection_analysis.pdf www.symantec.com
|Link=http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/trojan_zeroaccess_infection_analysis.pdf
|Author=Sean Hittel, Rong Zhou,  
|Author=Sean Hittel, Rong Zhou,  
|NomRevue=Symantec Security Response
|NomRevue=Symantec Security Response

Latest revision as of 21:50, 5 August 2015

(Publication) Google search: [1]

Trojan.ZeroAccess infection analysis
Botnet ZeroAccess
Malware ZeroAccess (bot)
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 /
Editor/Conference Symantec
Link http://www.symantec.com/content/en/us/enterprise/media/security response/whitepapers/trojan zeroaccess infection analysis.pdf (Archive copy)
Author Sean Hittel, Rong Zhou
Type

Abstract

ZeroAccess, also known as “Smiscer” or “Max++ rootkit”, is a malicious Windows threat used to generate revenue primarily through pay-per-click fraud. ZeroAccess uses low-level rootkit functionality to remain persistent and stealth. It arrives through various vectors, including Web exploit kits and social engineering attacks. Although ZeroAccess contains generic back door functionality that could be used for multiple purposes, it has been observed to download fake security software, perform click fraud, and search engine poisoning. In addition to describing ZeroAccess’ revenue generation scheme, this paper outlines examples of ZeroAccess’ infection vectors, as well as its infection logic and back door functionality. Through click fraud, the authors are estimated to earn six-figures annually.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR973,
   editor = {Symantec},
   author = {Sean Hittel, Rong Zhou},
   title = {Trojan.ZeroAccess infection analysis},
   date = {18},
   month = May,
   year = {2012},
   howpublished = {\url{http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/trojan_zeroaccess_infection_analysis.pdf}},
 }