Alina: following the shadow part 1
Jump to navigation
Jump to search
(Publication) Google search: [1]
Alina: following the shadow part 1 | |
---|---|
Botnet | Alina |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2013 / 2013-05-17 |
Editor/Conference | Trustwave |
Link | https://www.trustwave.com/Resources/SpiderLabs-Blog/Alina--Following-The-Shadow-Part-1/ (Archive copy) |
Author | Josh Grunzweig |
Type | Blogpost |
Abstract
“ I'm going to break up this post into a few different sections, and talk about how the malware family has evolved over time with respect to various categories. As I started writing this, it became apparent that it wouldn't fit into one blog post. As such, I've split it up into different parts. For this blog post I'm going to focus on the creation timeline, exfiltration, and C&C.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1609, editor = {Trustwave}, author = {Josh Grunzweig}, title = {Alina: following the shadow part 1}, date = {17}, month = May, year = {2013}, howpublished = {\url{https://www.trustwave.com/Resources/SpiderLabs-Blog/Alina--Following-The-Shadow-Part-1/}}, }