Botnet command server hidden in Tor
Jump to navigation
Jump to search
(Publication) Google search: [1]
Botnet command server hidden in Tor | |
---|---|
Botnet | Skynet |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | IRC, Tor |
Date | 2012 / 2012-09-10 |
Editor/Conference | GData |
Link | https://blog.gdatasoftware.com/blog/article/botnet-command-server-hidden-in-tor.html (Archive copy) |
Author | TS |
Type | Blogpost |
Abstract
“ The G Data SecurityLabs recently identified a malware sample that takes the next step in Command-and-Control (short: C&C) communication evolution, regarding C&C traffic obfuscation. The botnet owners placed their C&C server, which uses the common IRC protocol, as a hidden service inside of the Tor network.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR2229, editor = {GData}, author = {TS}, title = {Botnet command server hidden in Tor}, date = {10}, month = Sep, year = {2012}, howpublished = {\url{https://blog.gdatasoftware.com/blog/article/botnet-command-server-hidden-in-tor.html}}, }