More Flame/Skywiper CNC behavior uncovered
Jump to navigation
Jump to search
(Publication) Google search: [1]
More Flame/Skywiper CNC behavior uncovered | |
---|---|
Botnet | Flame, SKyWIper |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 26 juin 2012 |
Editor/Conference | FireEye |
Link | http://blog.fireeye.com/research/2012/06/flame-skywiper-cnc-update.html (Archive copy) |
Author | Ali Islam |
Type |
Abstract
“ When news of the Flame/SkyWiper malware hit the headlines last month, the world went into a frenzy. Flame was immediately hailed as the world’s most sophisticated malware. While security researchers will surely be talking about Flame for years to come, FireEye has since made another discovery regarding Flame’s command and control (CNC) behavior: it appears that the Flamer/sKyWIper malware’s callback has recently changed.
Bibtex
@misc{Islam2012BFR1055,
editor = {FireEye},
author = {Ali Islam},
title = {More Flame/Skywiper CNC behavior uncovered},
date = {Error: Invalid time.},
month = Error: Invalid time.,
year = {2012},
howpublished = {\url{http://blog.fireeye.com/research/2012/06/flame-skywiper-cnc-update.html}},
}