Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Zemot malware dropper strain delivered via Asprox botnet and exploit kits

Zemot malware dropper strain delivered via Asprox botnet and exploit kits

2014/09/11

Softpedia - (International) Microsoft researchers analyzed the Zemot malware dropper, a variant of Upatre, and observed that it has been distributed through the Asprox (also known as Kuluoz) spam botnet and via exploit kits including Magnitude and Nuclear Pack. Once it infects a system the dropper can then deliver click fraud malware and was recently observed to distribute information-stealing malware including Rovnix, Tesch, and Viknok.

Source: http://news.softpedia.com/news/Zemot-Malware-Dropper-Strain-Delivered-Via-Asprox-Botnet-and-Exploit-Kits-458437.shtml

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:21:41