The Pobelka botnet - a command and control case study

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

The Pobelka botnet - a command and control case study
Botnet Pobelka, Citadel
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 2012-12-17
Editor/Conference Digital Investigation
Link http://check.botnet.nu/technical.html check.botnet.net (check.botnet.net Archive copy)
Author Rickey Gevers
Type

Abstract

The Pobelka Botnet is a case study about -just another- citadel botnet. The botnet was dubbed Pobelka because the Command and Control that hid behind proxies used the domain name Pobelka***.***. Pobelka in Russian means "Money Laundering". Never was this domain used in any campaign nor malware url.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1274,
   editor = {Digital Investigation},
   author = {Rickey Gevers},
   title = {The Pobelka botnet - a command and control case study},
   date = {17},
   month = Dec,
   year = {2012},
   howpublished = {\url{http://check.botnet.nu/technical.html check.botnet.net}},
 }