Advertisement
daniel_bilar

malware leveraging 3rd party services

Oct 8th, 2015
286
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.08 KB | None | 0 0
  1. Use cases:
  2.  For proxying
  3.  For establishing a primary C&C channel  As a primary C&C channel
  4.  As a backup C&C channel
  5.  As an exfiltration channel
  6.  
  7. Backdoor.Makados - Google Docs
  8. APT17 - Microsoft TechNet
  9. Operation Poisoned Hurricane - Google Code
  10. Shadows in the Cloud - Twitter, Google Groups, Blogspot, Baidu Blogs, blog.com
  11. GeminiDuke - Twitter
  12. Trojan.Whitewell - Facebook
  13. Trojan-downloader f0xy - VKontakte
  14. Inception/CloudAtlas - CloudMe
  15. CloudDuke - Microsoft OneDrive
  16. IcoScript - Yahoo Mail
  17. APT1: GLOOXMAIL, MACROMAIL & CALENDAR - Google Talk, MSN Messenger & Google Calendar
  18. BlackEnergy - Google+ module
  19.  
  20. Android.Cajino - Baidu Cloud Push
  21. Android.Trojan-SMS.AndroidOS.FakeInst.a - Google Cloud Messaging
  22. Android.Trojan-SMS.AndroidOS.Agent.ao - Google Cloud Messaging
  23. Android.Trojan-SMS.AndroidOS.Agent.az - Google Cloud Messaging
  24. Android.Trojan-SMS.AndroidOS.OpFake.a - Google Cloud Messaging
  25. Android.Backdoor.AndroidOS.Maxit.a - Google Cloud Messaging
  26.  
  27. Cozy(Hammer)Duke - Twitter (Microsoft OneDrive for exfil)
  28. OSX.Flashback - Twitter
  29. Downloader.Sninfs- Tumblr
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement