VinSelf - A new backdoor in town
Revision as of 21:50, 5 August 2015 by Eric.freyssinet (talk | contribs) (Text replacement - " blog.fireeye.com" to "")
(Publication) Google search: [1]
VinSelf - A new backdoor in town | |
---|---|
Botnet | VinSelf |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2010 / 2010-11-23 |
Editor/Conference | FireEye |
Link | http://blog.fireeye.com/research/2010/11/winself-a-new-backdoor-in-town.html (Archive copy) |
Author | Atif Mushtaq |
Type |
Abstract
“ I recently came across a new piece of Modern Malware found to be involved in a highly targeted attack. My initial exploration into the malware revealed it to be a powerful backdoor with the capability to provide an attacker complete control over the infected system.
What's happening at the moment? A few weeks ago, we saw a powerful backdoor Pirpi exploiting the IE 0-day as part of some targeted attacks. Now comes VinSelf. The emergence of new and powerful backdoors and their use in the targeted attacks is evidence showing that modern malware is not only used to steal user's credit cards or send spam. There is much more at stake as well
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2010BFR1206, editor = {FireEye}, author = {Atif Mushtaq}, title = {VinSelf - A new backdoor in town}, date = {23}, month = Nov, year = {2010}, howpublished = {\url{http://blog.fireeye.com/research/2010/11/winself-a-new-backdoor-in-town.html}}, }