The tigger trojan: icky, sticky stuff

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

The tigger trojan: icky, sticky stuff
Botnet Tigger
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2009 / 24 février 2009
Editor/Conference Washington Post
Link http://voices.washingtonpost.com/securityfix/2009/02/the t-i-double-guh-r trojan ic.html voices.washingtonpost.com (voices.washingtonpost.com Archive copy)
Author Brian Krebs
Type

Abstract

iDefense analyst Michael Ligh found that Tigger appears designed to target mainly customers or employees of stock and options trading firms. Among the unusually short list of institutions specifically targeted by Tigger are E-Trade, ING Direct ShareBuilder, Vanguard, Options XPress, TD Ameritrade and Scottrade.

iDefense said the Trojan is the first known malware to exploit a specific vulnerability Microsoft patched in mid-October 2008. That flaw is what's known as a "privilege escalation" vulnerability, in that it cannot be exploited remotely, and merely allows the attacker to gain access to the almighty "administrator" account in Windows.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2009BFR1158,
   editor = {Washington Post},
   author = {Brian Krebs},
   title = {The tigger trojan: icky, sticky stuff},
   date = {Error: Invalid time.},
   month = Error: Invalid time.,
   year = {2009},
   howpublished = {\url{http://voices.washingtonpost.com/securityfix/2009/02/the_t-i-double-guh-r_trojan_ic.html voices.washingtonpost.com}},
 }