It didn’t take long time for spammers to start abusing the Boston Marathon bombing sending emails with links to various Youtube videos of the explosions at the Boston Marathon, an automatic download of a malicious binary named “boston.avi_______.exe”, embedded malicious java code and other iframed pages with malicious content.
Sample landing page with videos and Java
Microsoft has published a document http://www.microsoft.com/download/en/details.aspx?id=26673 that provides an overview of the Win32/Rustock family of rootkit-enabled backdoor trojans.
The document examines the background of Win32/Rustock, its functionality, how it works, and provides threat telemetry data and analysis from calendar year 2010 through May 2011.
In addition, the document details the legal and technical action used to takedown the Rustock botnet and how to detect and remove the threat using Microsoft antimalware products.
Categories: Backdoor, Botnet, Malware, säkerhet, Security, Trojan Backdoor, Botnet, Malware, Rootkit, Rustock, Säkerhet, Security, Trojan