Difference between revisions of "Zeus variant Floki bot targets PoS data"

From Botnets.fr
Jump to navigation Jump to search
(Created page with "{{Publication| Link=https://threatpost.com/zeus-variant-floki-bot-targets-pos-data/122310/}}")
 
 
Line 1: Line 1:
{{Publication| Link=https://threatpost.com/zeus-variant-floki-bot-targets-pos-data/122310/}}
{{Publication
|Botnet=Floki,
|Year=2016
|Date=2016-12-07
|Editor=Threatpost
|Link=https://threatpost.com/zeus-variant-floki-bot-targets-pos-data/122310/
|Author=Tom Spring,
|Type=Blogpost
|Abstract=This most recent version of Floki Bot, spotted in September, is based on the Zeus 2.0.8.9 source code released in 2011. There have been several incarnations of Floki Bot since then, however this most recent version is being developed, marketed and sold by a shrewd hacker that goes by the same name as the malware.
}}

Latest revision as of 23:48, 3 January 2017

(Publication) Google search: [1]

Zeus variant Floki bot targets PoS data
Botnet Floki
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2016 / 2016-12-07
Editor/Conference Threatpost
Link https://threatpost.com/zeus-variant-floki-bot-targets-pos-data/122310/ (Archive copy)
Author Tom Spring
Type Blogpost

Abstract

This most recent version of Floki Bot, spotted in September, is based on the Zeus 2.0.8.9 source code released in 2011. There have been several incarnations of Floki Bot since then, however this most recent version is being developed, marketed and sold by a shrewd hacker that goes by the same name as the malware.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2016BFR5314,
   editor = {Threatpost},
   author = {Tom Spring},
   title = {Zeus variant Floki bot targets PoS data},
   date = {07},
   month = Dec,
   year = {2016},
   howpublished = {\url{https://threatpost.com/zeus-variant-floki-bot-targets-pos-data/122310/}},
 }