Citadel trojan malware analysis
Jump to navigation
Jump to search
(Publication) Google search: [1]
Citadel trojan malware analysis | |
---|---|
Botnet | Citadel |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-09-14 |
Editor/Conference | DELL SecureWorks |
Link | http://botnetlegalnotice.com/citadel/files/Patel Decl Ex20.pdf (Archive copy) |
Author | Jason Milletary |
Type | Tech report |
Abstract
“ In May 2011, source code for the infamous Zeus Trojan horse was leaked on the Internet. In addition to providing a glimpse inside a notorious piece of adversarial tradecraft, the source code provided an opportunity for enterprising malware authors to meet an emerging demand for cybercrime tools. Two major toolkits based on the leaked Zeus source code have become renown in the marketplace: ICE IX and Citadel.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR4747, editor = {DELL SecureWorks}, author = {Jason Milletary}, title = {Citadel trojan malware analysis}, date = {14}, month = Sep, year = {2012}, howpublished = {\url{http://botnetlegalnotice.com/citadel/files/Patel_Decl_Ex20.pdf}}, }