Virut malware fuels Waledac botnet resurgence
Revision as of 12:10, 31 July 2015 by Eric.freyssinet (talk | contribs) (Text replacement - "/ www." to "/ |Site=www.")
(Publication) Google search: [1]
Virut malware fuels Waledac botnet resurgence | |
---|---|
Botnet | Virut, Waledac |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2013 / 2013-01-15 |
Editor/Conference | Haymarket Media, Inc |
Link | http://www.scmagazine.com/virut-malware-fuels-waledac-botnet-resurgence/article/276183/ (Archive copy) |
Author | Danielle Walker |
Type | Blogpost |
Abstract
“ The Waledac worm, which targets Windows systems and sends spam from infected computers, has made its return with the help of the Virut virus, according to researchers.
And the latest junk mail campaign may not be the first time that Waledac and Virut attackers have worked together to prey on unsuspecting users.
Back in 2009, researchers believed that Waledac operators utilized Virut to carry out a Bank of America certificate scam by which victims' computers were hijacked to deliver spam and host malware-serving websites.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1296, editor = {Haymarket Media, Inc}, author = {Danielle Walker}, title = {Virut malware fuels Waledac botnet resurgence}, date = {15}, month = Jan, year = {2013}, howpublished = {\url{http://www.scmagazine.com/virut-malware-fuels-waledac-botnet-resurgence/article/276183/}}, }