|
A brief glance inside Fragus |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
A brief glance inside Fragus Par EvilFingersLe [2009-12-05] à 09:14:24
Présentation : Fragus is a web application developed for the management of zombies, of Russian origin, who long to live has been inserted crimeware clandestine market with an affordable price USD 800 if we consider criminal capabilities it offers. The crimeware is basically composed of five sections Statistics, Files, Sellers, Traffic links and Preferences. Each handles a specific task and they all complement one another. In the Files panel is handling the executable file that will spread. Sellers are in management exploits. In this case, corresponding to the first version of Fragus. Regarding the Traffic links module, allows the previous and setting the iframe script that will be injected into the page that shall act as driver for the implementation of the configurator exploits the previous panel, that look for vulnerabilities on the victim machine . However, one of the patterns identified in each of the packages of this style is the Statistical module. This module provides the intelligence necessary for the botmaster get a detailed report of the teams not only zombies but also on certain aspects needed to know in detail what should exploit to run. Another interesting patterns we can deduce on the basis of this information is that the operating system is exploited Windows XP with Internet Explorer, the exploit more effectively, despite being very old MS06-014 is the one that takes the vulnerability in MDAC and that among the countries with the highest rates of infection are the USA and Korea. This represents a common scenario where perhaps the relevance factor is the inference that perhaps common situation due to the large volume of user who uses the Microsoft operating system on a non-licensed, which leads to not update . Finally, another important factor that must not be overlooked is that cyber-criminals are not interested in the controversy surrounding the safety levels offered by one or another operating system Windows, GNU Linux and Mac OS but all fall into the same category of potential victims because the vulnerability exploited in layer 7. Related informationFragus. Nueva botnet framework In-the-Wild JustExploit. Nuevo Exploit Kit que explota Java DDoS Botnet. Nuevo crimeware de propósito particular T-IFRAMER. Kit para la inyección de malware In-the-Wild ZoPAck. Nueva alternativa para la explotación de vulnerabilidades ZeuS Botnet y su poder de reclutamiento zombi Eleonore Exploits Pack. Nuevo crimeware In-the-Wild Liberty Exploit System. Otra alternativa ... para el control de botnets Jorge Mieres Pistus Malware Intelligence
Les derniers articles du site "EvilFingers" :
- EFBlog Moved Permanently - Crimeware in 2009 - Anti-Virus Live 2010. Talking with the enemy - RussKill. Application to perform denial of service attacks - Bypassing Windows Unknown Publisher Verification For Web Downloaded Executables - Fusion. A concept adopted by the current crimeware II - Disinformation campaign to spread malware - A brief glance inside Fragus - Exploiting WebView through Internet Explorer to remotely discover windows directory - Koobface campaign spread through Blogspot
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.191.75.173 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.191.75.173 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|