Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Yebot backdoor built for wide range of malicious operations

Yebot backdoor built for wide range of malicious operations

2015/03/24

Softpedia - (International) Security researchers from Dr.Web discovered that a backdoor trojan dubbed Yebot can run file transfer protocol (FTP) and socket secure (SOCKS) 5 proxy servers, gain remote access to systems through a remote desktop protocol (RDP), capture keystrokes and screenshots, intercept system functions, change code of running processes, search for private keys, and intercept all features associated with Web browsing. The trojan infects computers by injecting code into four Microsoft Windows processes before downloading and decrypting its contents and running in memory.

Source: http://news.softpedia.com/news/Yebot-Backdoor-Built-for-a-Slew-of-Malicious-Operations-476654.shtml

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:23:50