Professional Webmasters Community
Would you like to react to this message? Create an account in a few clicks or log in to continue.

Extracting CnC from Malware

Go down

Extracting CnC from Malware Empty Extracting CnC from Malware

Post  andry Thu Dec 16, 2010 6:08 am

The Role of Malware Sample Analysis in Botnet Detection

There often appears to be little or no difference between malware and botnets. If a computer system is infected with either then, as far as users and IT staff are concerned, it is compromised and can no longer be trusted for confidential business use. However, this distinction is important. Both are used by organized cyber criminals for financial gain, but botnets add another dimension to the threat – the ability to be remotely controlled and serve as a digital bridge into an organization.

Modern botnet software typically ships with the full spectrum of malicious capabilities found in top-of-the-line malware. It becomes a ‘botnet’ if it contains features that allow it to communicate with a criminal Command-and-Control (CnC) infrastructure and can be remotely controlled.

Download: PDF
andry
andry
Moderator
Moderator

Posts : 467
Join date : 2010-05-07

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum