Travnet trojan could be part of APT campaign
Jump to navigation
Jump to search
(Publication) Google search: [1]
Travnet trojan could be part of APT campaign | |
---|---|
Botnet | Travnet |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2013 / 2013-03-14 |
Editor/Conference | McAfee |
Link | http://blogs.mcafee.com/mcafee-labs/travnet-trojan-could-be-part-of-apt-campaign (Archive copy) |
Author | Vikas Taneja |
Type | Blogpost |
Abstract
“ Attackers use all kinds of attack vectors to steal sensitive information from their targets. Their efforts are not limited to only zero-day vulnerabilities. Malware authors often exploit old vulnerabilities because a large number of organizations still use old vulnerable software. The Trojan Travnet, which steals information, is a classic example of malware that takes advantage of unpatched software. We have recently observed malicious Travnet RTF and Excel documents that exploit old vulnerabilities, such as CVE-2010-3333, in Microsoft Office. During our investigation we identified some samples associated with this campaign that have been active since 2009.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1322, editor = {McAfee}, author = {Vikas Taneja}, title = {Travnet trojan could be part of APT campaign}, date = {14}, month = Mar, year = {2013}, howpublished = {\url{http://blogs.mcafee.com/mcafee-labs/travnet-trojan-could-be-part-of-apt-campaign}}, }