The Return of Qakbot. Research I did together with @jgouv on the new C&C communication of the Qakbot malware http://www.anubisnetworks.com/the-return-of-qakbot/ …
-
-
Replying to @martijn_grooten
@martijn_grooten@jgouv Also, the default password list they used made me lol. Where is "toor"? ;-) : http://pastebin.com/raw.php?i=Z4t3it0i …1 reply 1 retweet 0 likes -
Replying to @bartblaze
@bartblaze@jgouv How is this related to Qakbot? (It probably is, I'm just missing the link at the moment.)1 reply 0 retweets 0 likes -
Replying to @martijn_grooten
@martijn_grooten@jgouv That's what I pulled after a quick glance :-) Seems they try some popular passwords to gain access/persistance.1 reply 0 retweets 0 likes -
Replying to @bartblaze
@bartblaze Still not sure where I pulled that from...1 reply 0 retweets 0 likes -
Replying to @martijn_grooten
@martijn_grooten Just strings from the binary.1 reply 0 retweets 0 likes -
Replying to @bartblaze
@bartblaze Ah, OK :-) Hadn't really looked at the binary. They've pulled that data off the Internet btw e.g. http://toddmazierski.com/doc/forgery-0.5.0/lib/forgery/dictionaries/female_first_names.html …1 reply 0 retweets 1 like
@martijn_grooten Very interesting, thanks for sharing!
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.