Digging inside Tinba malware - A walkthrough
Jump to navigation
Jump to search
(Publication) Google search: [1]
Digging inside Tinba malware - A walkthrough | |
---|---|
Botnet | Tinba |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 14 juin 2012 |
Editor/Conference | SecNiche |
Link | http://secniche.blogspot.it/2012/06/two-weeks-back-tinba-malware-hit.html secniche.blogspot.it (secniche.blogspot.it Archive copy) |
Author | Aditya K Sood |
Type |
Abstract
“ Two weeks back, Tinba malware hit the internet. Though our team spent some time in looking at the various artifacts of Tinba malware. ZeuS and SpyEye have given birth to new breed of botnets. The upcoming generation of botnets are extensively utilizing the tactics introduced by ZeuS and SpyEye. Tinba is a small notorious malware that aimed specifically for stealing information from the browsers. For more details about Man-in-the-Browser (MitB), one can read our paper on FormGrabbing here - http://www.virusbtn.com/virusbulletin/archive/2011/11/vb201111-form-grabbing.
Other researchers have presented details about Tinba which can be found here - http://www.csis.dk/en/csis/news/3566/
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1046, editor = {SecNiche}, author = {Aditya K Sood}, title = {Digging inside Tinba malware - A walkthrough}, date = {Error: Invalid time.}, month = Error: Invalid time., year = {2012}, howpublished = {\url{http://secniche.blogspot.it/2012/06/two-weeks-back-tinba-malware-hit.html secniche.blogspot.it}}, }