Trojan moves its configuration to Twitter, LinkedIn, MSDN and Baidu

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

Trojan moves its configuration to Twitter, LinkedIn, MSDN and Baidu
Socialcfg1.png
Botnet
Malware Sogu, Thoper, TVT, Destory Rat
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 26 mars 2012
Editor/Conference Norman
Link http://blogs.norman.com/2012/security-research/trojan-moves-its-configuration-to-twitter-linkedin-msdn-and-baidu blogs.norman.com (blogs.norman.com Archive copy)
Author Snorre Fagerland
Type

Abstract

Sogu (alias Thoper, TVT, Destory Rat etc) is a large remote access trojan that has been used in a number of intrusions and targeted attacks. One of these was the large scale intrusion into servers owned by SK Communications in South Korea July 2011, where personal information of up to 35 million users (!) of the CyWorld and Nateon services were compromized.

The Command&Control servers, through which Sogu communicates with its masters, are typically defined in an encoded configuration block near the end of the trojan.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR968,
   editor = {Norman},
   author = {Snorre Fagerland},
   title = {Trojan moves its configuration to Twitter, LinkedIn, MSDN and Baidu},
   date = {27},
   month = Mar,
   year = {2012},
   howpublished = {\url{http://blogs.norman.com/2012/security-research/trojan-moves-its-configuration-to-twitter-linkedin-msdn-and-baidu blogs.norman.com}},
 }