- Nov 5, 2011
- 5,855
.
Bad news: THOR : Another P2P Botnet in development with extra stealth features topic here ..
THOR : Another P2P Botnet in development with extra stealth features : on thehackernews.com of course: http://thehackernews.com/2012/03/thor-another-p2p-botnet-in-development.html
QUOTE:
'The 'research' (uh, research ..) community is now focusing on the integration of peer-to-peer (P2P) concepts as incremental improvements to distributed malicious software networks (now generically referred to as botnets). Because “botnets” can be used for illicit financial gain,they have become quite popular in recent Internet attacks.'
'Thor is a decentralised P2P botnet .. Thor uses DLL injection, IAT hooking, ring3 rootkit amongst other things to hide. One more interesting Feature that It have it's own module system so you can write your own modules with our easy API system. It include peer to peer communication uses 256-AES encryption with random key generation at each startup.'
- then our anti-rootkits are good for this, I hope. PowerTool, XueTr, NVT Anti-Rootkit, Radix etc .. Look on our topics about, please.
.
Bad news: THOR : Another P2P Botnet in development with extra stealth features topic here ..
THOR : Another P2P Botnet in development with extra stealth features : on thehackernews.com of course: http://thehackernews.com/2012/03/thor-another-p2p-botnet-in-development.html
QUOTE:
'The 'research' (uh, research ..) community is now focusing on the integration of peer-to-peer (P2P) concepts as incremental improvements to distributed malicious software networks (now generically referred to as botnets). Because “botnets” can be used for illicit financial gain,they have become quite popular in recent Internet attacks.'
'Thor is a decentralised P2P botnet .. Thor uses DLL injection, IAT hooking, ring3 rootkit amongst other things to hide. One more interesting Feature that It have it's own module system so you can write your own modules with our easy API system. It include peer to peer communication uses 256-AES encryption with random key generation at each startup.'
- then our anti-rootkits are good for this, I hope. PowerTool, XueTr, NVT Anti-Rootkit, Radix etc .. Look on our topics about, please.
.