Malware targeting Windows 8 uses Google Docs
Jump to navigation
Jump to search
(Publication) Google search: [1]
Malware targeting Windows 8 uses Google Docs | |
---|---|
Botnet | Makadocs |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-11-17 |
Editor/Conference | Symantec |
Link | http://www.symantec.com/connect/blogs/malware-targeting-windows-8-uses-google-docs (Archive copy) |
Author | Takashi Katsuki |
Type |
Abstract
“ Initially, I thought that Backdoor.Makadocs was a simple and typical back door Trojan horse. It receives and executes commands from a command-and-control (C&C) server and it gathers information from the compromised computer including the host name and the operating system type. Interestingly, the malware author has also considered the possibility that the compromised computer could be running Windows 8 or Windows Server 2012.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1203, editor = {Symantec}, author = {Takashi Katsuki}, title = {Malware targeting Windows 8 uses Google Docs}, date = {17}, month = Nov, year = {2012}, howpublished = {\url{http://www.symantec.com/connect/blogs/malware-targeting-windows-8-uses-google-docs}}, }