Virut malware fuels Waledac botnet resurgence

From Botnets.fr
Revision as of 12:10, 31 July 2015 by Eric.freyssinet (talk | contribs) (Text replacement - "/ www." to "/ |Site=www.")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

Virut malware fuels Waledac botnet resurgence
Botnet Virut, Waledac
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2013 / 2013-01-15
Editor/Conference Haymarket Media, Inc
Link http://www.scmagazine.com/virut-malware-fuels-waledac-botnet-resurgence/article/276183/ (Archive copy)
Author Danielle Walker
Type Blogpost

Abstract

The Waledac worm, which targets Windows systems and sends spam from infected computers, has made its return with the help of the Virut virus, according to researchers.

And the latest junk mail campaign may not be the first time that Waledac and Virut attackers have worked together to prey on unsuspecting users.

Back in 2009, researchers believed that Waledac operators utilized Virut to carry out a Bank of America certificate scam by which victims' computers were hijacked to deliver spam and host malware-serving websites.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1296,
   editor = {Haymarket Media, Inc},
   author = {Danielle Walker},
   title = {Virut malware fuels Waledac botnet resurgence},
   date = {15},
   month = Jan,
   year = {2013},
   howpublished = {\url{http://www.scmagazine.com/virut-malware-fuels-waledac-botnet-resurgence/article/276183/}},
 }