Houdini added

This commit is contained in:
Alexandre Dulaunoy 2016-10-25 23:35:04 +02:00
parent 9a93c0aee1
commit 1846020d00

View file

@ -522,6 +522,12 @@
"value": "Odinaff", "value": "Odinaff",
"description": "Odinaff is typically deployed in the first stage of an attack, to gain a foothold onto the network, providing a persistent presence and the ability to install additional tools onto the target network. These additional tools bear the hallmarks of a sophisticated attacker which has plagued the financial industry since at least 2013Carbanak. This new wave of attacks has also used some infrastructure that has previously been used in Carbanak campaigns.", "description": "Odinaff is typically deployed in the first stage of an attack, to gain a foothold onto the network, providing a persistent presence and the ability to install additional tools onto the target network. These additional tools bear the hallmarks of a sophisticated attacker which has plagued the financial industry since at least 2013Carbanak. This new wave of attacks has also used some infrastructure that has previously been used in Carbanak campaigns.",
"refs": ["https://www.symantec.com/connect/blogs/odinaff-new-trojan-used-high-level-financial-attacks"] "refs": ["https://www.symantec.com/connect/blogs/odinaff-new-trojan-used-high-level-financial-attacks"]
},
{
"value": "Hworm",
"description": "Unit 42 has observed a new version of Hworm (or Houdini) being used within multiple attacks. This blog outlines technical details of this new Hworm version and documents an attack campaign making use of the backdoor. Of the samples used in this attack, the first we observed were June 2016, while as-of publication we were still seeing attacks as recently as mid-October, suggesting that this is likely an active, ongoing campaign.",
"refs": ["http://researchcenter.paloaltonetworks.com/2016/10/unit42-houdinis-magic-reappearance/"],
"synonyms": ["Houdini"]
} }
], ],
"version": 1, "version": 1,