Security alert: SpamSoldier
Jump to navigation
Jump to search
(Publication) Google search: [1]
Security alert: SpamSoldier | |
---|---|
Botnet | SpamSoldier |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-12-17 |
Editor/Conference | Lookout |
Link | https://blog.lookout.com/blog/2012/12/17/security-alert-spamsoldier/ blog.lookout.com (blog.lookout.com Archive copy) |
Author | Derek Halliday |
Type |
Abstract
“
Background
On December 3, in cooperation with one of our carrier partners, Lookout identified SpamSoldier, a spammer botnet agent that uses infected phones to send a barrage of SMS spam messages without the user’s consent.
Summary
All Lookout users are protected against this family of malware, and it appears that the distribution remains relatively limited. Even at these limited distribution levels, SpamSoldier still has the potential to make a big impact at a network level: a single prolonged infection could result in thousands of SMS spam messages.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1273, editor = {Lookout}, author = {Derek Halliday}, title = {Security alert: SpamSoldier}, date = {17}, month = Dec, year = {2012}, howpublished = {\url{https://blog.lookout.com/blog/2012/12/17/security-alert-spamsoldier/ blog.lookout.com}}, }