Sopelka Botnet: three banking trojans and one banking panel
Jump to navigation
Jump to search
(Publication) Google search: [1]
Sopelka Botnet: three banking trojans and one banking panel | |
---|---|
Botnet | Sopelka, Tatanga, Feodo, Citadel |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-10-17 |
Editor/Conference | S21sec |
Link | http://securityblog.s21sec.com/2012/10/sopelka-botnet-three-banking-trojans.html (Archive copy) |
Author | Jose Miguel Esparza |
Type | Blogpost |
Abstract
“ Sopelka botnet started life in May this year and was taken down by end of September. It has been called Sopelka because of the path used in the distribution of binaries and configuration files, and was an odd mixture of variants of the known banking trojans Tatanga, Feodo and Citadel.
This botnet’s objective was the collection of banking credentials from European entities, mostly banks from Spain and Germany, but also Holland, Italy and Malta. In addition, it made use of different mobile components for Android, BlackBerry and Symbian phones. Symbian was the first operating system where this type of malicious component emerged two years ago.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1180, editor = {S21sec}, author = {Jose Miguel Esparza}, title = {Sopelka Botnet: three banking trojans and one banking panel}, date = {17}, month = Oct, year = {2012}, howpublished = {\url{http://securityblog.s21sec.com/2012/10/sopelka-botnet-three-banking-trojans.html}}, }