McAfee Labs threat advisory : W32.Pinkslipbot

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

McAfee Labs threat advisory : W32.Pinkslipbot
Botnet Akbot
Malware Akbot_(bot)
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / February 22, 2012
Editor/Conference McAfee
Link https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT DOCUMENTATION/22000/PD22960/en US/McAfee-Labs-ThreatAdvisory-Pinkslipbot.pdf (Archive copy)
Author
Type Tech report

Abstract

The W32/Pinkslipbot worm is capable of spreading over network shares, downloading files, and updating its software. Additionally, it is capable of receiving back door command from its IRC command and control center. It attempts to steal user information and upload it to FTP sites.

Aliases: • Qakbot • Akbot • Qbot Detailed information about the worm, its propagation, and mitigation are in the following sections:

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR914,
   editor = {McAfee},
   author = {},
   title = {McAfee Labs threat advisory : W32.Pinkslipbot},
   date = {22},
   month = Feb,
   year = {2012},
   howpublished = {\url{https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/22000/PD22960/en_US/McAfee-Labs-ThreatAdvisory-Pinkslipbot.pdf}},
 }