TinyNuke may be a ticking time bomb

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

TinyNuke may be a ticking time bomb
Botnet TinyNuke
Malware
Botnet/malware group Banking
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2017 / 2017-04-05
Editor/Conference McAfee
Link https://securingtomorrow.mcafee.com/business/tinynuke-may-ticking-time-bomb/ (Archive copy)
Author Douglas McKee
Type Blogpost

Abstract

On March 12th, 2017 a low-profile developer uploaded to Github a mostly functional Botnet code named TinyNuke. The user, Aainz, uses his real name in connection with this code. It’s not unusual for security professionals or hobbyist to release proof of concept code to enable the industry to learn from the latest techniques and test against their own security measures. Aainz’s release looks closer to that of many bad actors before him. The TinyNuke codebase was released as a fully weaponized botnet with built-in features, including HTML code injection, typically used to steal web services credentials. The author himself describes the botnet to be a Zeus-style banking trojan which was first found in the wild in 2007 and became one of the most widely known and used banking trojans to date.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2017BFR5340,
   editor = {McAfee},
   author = {Douglas McKee},
   title = {TinyNuke may be a ticking time bomb},
   date = {05},
   month = Apr,
   year = {2017},
   howpublished = {\url{https://securingtomorrow.mcafee.com/business/tinynuke-may-ticking-time-bomb/}},
 }