Seenthis
•
 
Identifiants personnels
  • [mot de passe oublié ?]

  • https://www.us-cert.gov
  • /ncas
  • /alerts

Dorkbot

/TA15-337A

  • @erratic
    schrödinger @erratic 6/12/2015

    Dorkbot

    ▻https://www.us-cert.gov/ncas/alerts/TA15-337A

    Dorkbot is designed to steal passwords for online accounts, including social networks like Facebook and Twitter, as well as to install additional malware that can turn infected endpoints into nodes in a DDoS attack or part of a spam relay.

    Dorkbot is commonly spread via malicious links sent through social networks, instant message programs or through infected USB devices.

    Dorkbot is operated via IRC, and exists since 2011.

    Dorkbot Botnets Get Busted (4 December 2015)

    ▻http://www.bankinfosecurity.com/dorkbot-ddos-botnets-get-busted-a-8728/op-1

    #dorkbot #ngrbot
    #botnet

    schrödinger @erratic
    • @erratic
      schrödinger @erratic 6/12/2015

      Win32/Dorkbot botnet disrupted by Microsoft and law enforcement officials

      ▻http://www.winbeta.org/news/win32dorkbot-botnet-disrupted-microsoft-law-enforcement-officials

      Microsoft indicated that the following websites are prime candidates for Dorkbot to steal usernames and passwords: AOL, eBay, Facebook, Gmail, GoDaddy, OfficeBanking, Mediafire, Netflix, PayPal, Steam, Twitter, Yahoo, and YouTube. Dorkbot also blocks you from accessing anti-virus and anti-malware programs and websites like: Avast, Bitdefender, F-Secure, Kaspersky, Malwarebytes, McAfee, Norton, Sophos, Trend Micro, and VirusTotal.

      schrödinger @erratic
    Écrire un commentaire