TinyNuke may be a ticking time bomb
(Publication) Google search: [1]
TinyNuke may be a ticking time bomb | |
---|---|
Botnet | TinyNuke |
Malware | |
Botnet/malware group | Banking |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2017 / 2017-04-05 |
Editor/Conference | McAfee |
Link | https://securingtomorrow.mcafee.com/business/tinynuke-may-ticking-time-bomb/ (Archive copy) |
Author | Douglas McKee |
Type | Blogpost |
Abstract
“ On March 12th, 2017 a low-profile developer uploaded to Github a mostly functional Botnet code named TinyNuke. The user, Aainz, uses his real name in connection with this code. It’s not unusual for security professionals or hobbyist to release proof of concept code to enable the industry to learn from the latest techniques and test against their own security measures. Aainz’s release looks closer to that of many bad actors before him. The TinyNuke codebase was released as a fully weaponized botnet with built-in features, including HTML code injection, typically used to steal web services credentials. The author himself describes the botnet to be a Zeus-style banking trojan which was first found in the wild in 2007 and became one of the most widely known and used banking trojans to date.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2017BFR5340, editor = {McAfee}, author = {Douglas McKee}, title = {TinyNuke may be a ticking time bomb}, date = {05}, month = Apr, year = {2017}, howpublished = {\url{https://securingtomorrow.mcafee.com/business/tinynuke-may-ticking-time-bomb/}}, }