More Flame/Skywiper CNC behavior uncovered

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

More Flame/Skywiper CNC behavior uncovered
Botnet Flame, SKyWIper
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 26 juin 2012
Editor/Conference FireEye
Link http://blog.fireeye.com/research/2012/06/flame-skywiper-cnc-update.html (Archive copy)
Author Ali Islam
Type

Abstract

When news of the Flame/SkyWiper malware hit the headlines last month, the world went into a frenzy. Flame was immediately hailed as the world’s most sophisticated malware. While security researchers will surely be talking about Flame for years to come, FireEye has since made another discovery regarding Flame’s command and control (CNC) behavior: it appears that the Flamer/sKyWIper malware’s callback has recently changed.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1055,
   editor = {FireEye},
   author = {Ali Islam},
   title = {More Flame/Skywiper CNC behavior uncovered},
   date = {Error: Invalid time.},
   month = Error: Invalid time.,
   year = {2012},
   howpublished = {\url{http://blog.fireeye.com/research/2012/06/flame-skywiper-cnc-update.html}},
 }