Torpig: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
reformulated to past tense
Line 1: Line 1:
'''Torpig''', also known as '''Sinowal''' or '''Anserin''' (mainly spread together with [[Mebroot]] rootkit), is a type of [[botnet]] spread by a variety of [[Trojan horse (computing)|trojan horses]] which can affect computers that use [[Microsoft Windows]]. Torpig circumvents anti-virus applications through the use of [[rootkit]] technology and scans the infected system for credentials, accounts and passwords as well as potentially allowing attackers full access to the computer. It is also purportedly capable of modifying data on the computer, and can perform [[man-in-the-browser]] attacks.
'''Torpig''', also known as '''Sinowal''' or '''Anserin''' (mainly spread together with [[Mebroot]] rootkit), is a type of [[botnet]] spread by a variety of [[Trojan horse (computing)|trojan horses]] which can affect computers that use [[Microsoft Windows]]. Torpig circumvents anti-virus applications through the use of [[rootkit]] technology and scans the infected system for credentials, accounts and passwords as well as potentially allowing attackers full access to the computer. It is also purportedly capable of modifying data on the computer, and can perform [[man-in-the-browser]] attacks.


As of November 2008 it has been responsible for stealing the details of about 500,000 online bank accounts and credit and debit cards and is described as "one of the most advanced pieces of crimeware ever created".<ref>[http://news.bbc.co.uk/1/hi/technology/7701227.stm BBC News: Trojan virus steals bank info]</ref>
By November 2008, it was considered that Torpig had stolen the details of about 500,000 online bank accounts and credit and debit cards and was described as "one of the most advanced pieces of crimeware ever created".<ref>[http://news.bbc.co.uk/1/hi/technology/7701227.stm BBC News: Trojan virus steals bank info]</ref>


In early 2009, a team of security researchers from [[University of California, Santa Barbara]] took control of the botnet for ten days. During that time, they extracted an unprecedented amount (over 70 [[Gigabyte|GB]]) of stolen data and redirected 1.2 million IPs on to their private command and control server. The report<ref>[http://www.cs.ucsb.edu/~seclab/projects/torpig/index.html UCSB Torpig report]</ref> goes into great detail about how the botnet operates.
In early 2009, a team of security researchers from [[University of California, Santa Barbara]] took control of the botnet for ten days. During that time, they extracted an unprecedented amount (over 70 [[Gigabyte|GB]]) of stolen data and redirected 1.2 million IPs on to their private command and control server. The report<ref>[http://www.cs.ucsb.edu/~seclab/projects/torpig/index.html UCSB Torpig report]</ref> goes into great detail about how the botnet operates.

Revision as of 17:47, 16 October 2012

Torpig, also known as Sinowal or Anserin (mainly spread together with Mebroot rootkit), is a type of botnet spread by a variety of trojan horses which can affect computers that use Microsoft Windows. Torpig circumvents anti-virus applications through the use of rootkit technology and scans the infected system for credentials, accounts and passwords as well as potentially allowing attackers full access to the computer. It is also purportedly capable of modifying data on the computer, and can perform man-in-the-browser attacks.

By November 2008, it was considered that Torpig had stolen the details of about 500,000 online bank accounts and credit and debit cards and was described as "one of the most advanced pieces of crimeware ever created".[1]

In early 2009, a team of security researchers from University of California, Santa Barbara took control of the botnet for ten days. During that time, they extracted an unprecedented amount (over 70 GB) of stolen data and redirected 1.2 million IPs on to their private command and control server. The report[2] goes into great detail about how the botnet operates.

See also

References

External links