NetTraveler is back: the 'Red Star' APT returns with new tricks
Jump to navigation
Jump to search
(Publication) Google search: [1]
NetTraveler is back: the 'Red Star' APT returns with new tricks | |
---|---|
Botnet | NetTraveler |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | Red Star |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2013 / 2013-09-03 |
Editor/Conference | Kaspersky lab |
Link | http://securelist.com/blog/incidents/57455/nettraveler-is-back-the-red-star-apt-returns-with-new-tricks/ (Archive copy) |
Author | Costin Raiu |
Type | Blogpost |
Abstract
“ NetTraveler, which we described in depth in a previous post, is an APT that infected hundreds of high profile victims in more than 40 countries. Known targets of NetTraveler (also known as 'Travnet' or "Netfile") include Tibetan/Uyghur activists, oil industry companies, scientific research centers and institutes, universities, private companies, governments and governmental institutions, embassies and military contractors.
During the last week, several spear-phishing e-mails were sent to multiple Uyghur activists.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1410, editor = {Kaspersky lab}, author = {Costin Raiu}, title = {NetTraveler is back: the 'Red Star' APT returns with new tricks}, date = {03}, month = Sep, year = {2013}, howpublished = {\url{http://securelist.com/blog/incidents/57455/nettraveler-is-back-the-red-star-apt-returns-with-new-tricks/}}, }