VinSelf - A new backdoor in town

From Botnets.fr
Revision as of 20:50, 5 August 2015 by Eric.freyssinet (talk | contribs) (Text replacement - " blog.fireeye.com" to "")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

VinSelf - A new backdoor in town
Botnet VinSelf
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2010 / 2010-11-23
Editor/Conference FireEye
Link http://blog.fireeye.com/research/2010/11/winself-a-new-backdoor-in-town.html (Archive copy)
Author Atif Mushtaq
Type

Abstract

I recently came across a new piece of Modern Malware found to be involved in a highly targeted attack. My initial exploration into the malware revealed it to be a powerful backdoor with the capability to provide an attacker complete control over the infected system.

What's happening at the moment? A few weeks ago, we saw a powerful backdoor Pirpi exploiting the IE 0-day as part of some targeted attacks. Now comes VinSelf. The emergence of new and powerful backdoors and their use in the targeted attacks is evidence showing that modern malware is not only used to steal user's credit cards or send spam. There is much more at stake as well

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2010BFR1206,
   editor = {FireEye},
   author = {Atif Mushtaq},
   title = {VinSelf - A new backdoor in town},
   date = {23},
   month = Nov,
   year = {2010},
   howpublished = {\url{http://blog.fireeye.com/research/2010/11/winself-a-new-backdoor-in-town.html}},
 }