Trojan on the loose: an in-depth analysis of police trojan

From Botnets.fr
Revision as of 22:13, 5 August 2015 by Eric.freyssinet (talk | contribs) (Text replacement - " blog.trendmicro.com" to "")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

Trojan on the loose: an in-depth analysis of police trojan
Policelockbytrendmicro.png
Botnet Goldenbaks
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 /
Editor/Conference Trend Micro
Link http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp police trojan.pdf (Archive copy)
Author David Sancho, Feike Hacquebord
Type

Abstract

A ransomware is a kind of malware that withholds some

digital assets from victims and asks for payment for the assets’ release. Ransomware attacks were first seen in Russia in 2005–2006 and have since changed tactics and targets. The most recent wave of ransomware attacks targeted users in a very specific way—tracking their geographic locations and scaring them with their respective countries' police forces while holding their entire systems captive. These attacks have come to be known as the “Police Trojan” attacks. Trend Micro has been tracking this campaign since the beginning and is now ready to show some of our conclusions after the investigation. A mix of well-tuned social engineering tactics as well as an advanced and very dynamic networking model shows that the Police Trojan’s creators are well-organized, apart from being persistent and creative.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR976,
   editor = {Trend Micro},
   author = {David Sancho, Feike Hacquebord},
   title = {Trojan on the loose: an in-depth analysis of police trojan},
   date = {26},
   month = Apr,
   year = {2012},
   howpublished = {\url{http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_police_trojan.pdf}},
 }