翻訳と辞書
Words near each other
・ Koolakamba
・ Koolama Bay
・ Koolan Island
・ Koolanooka, Western Australia
・ Koolarrow Records
・ Koolasuchus
・ Koolatong River
・ Koolbury railway station
・ Koolerz
・ Kooletah
・ Koolewong railway station
・ Koolewong, New South Wales
・ Koolhaas
・ Koobabbie Important Bird Area
・ Koobassaare
Koobface
・ Koobi Fora
・ Koobits
・ Kooboo
・ Koobox
・ KOOC
・ Koochiching County, Minnesota
・ Koochiching State Forest
・ Koochie Koochie Hota Hai
・ Koochy
・ Koodal
・ Koodal Azhagar Temple
・ Koodal Nagar
・ Koodali
・ Koodali Higher Secondary School


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Koobface : ウィキペディア英語版
Koobface

Koobface is network hacking worm that attacks Microsoft Windows, Mac OS X, and Linux platforms. This worm originally targeted users of the networking websites like Facebook, Skype, Yahoo Messenger, and email websites such as GMail, Yahoo Mail, and AOL Mail. It also targets other networking websites, such as MySpace, Twitter,〔(US-CERT Malicious Code Targeting Social Networking Site Users, added March 4, 2009, at 11:53 am )〕 and it can infect other devices on the same local network.〔(【引用サイトリンク】title=Twitter Status - Koobface malware attack )〕 This infection allows an attacker to access users' personal information such as banking information, passwords, or personal identity (IP address). It is considered a security risk and should be removed from the network.
==Infection==
Koobface ultimately attempts, upon successful infection, to gather login information for FTP sites, Facebook, Skype, and other social media platforms, and any sensitive financial data as well.〔(Koobface: Inside a Crimeware Network )〕 It then uses compromised computers to build a peer-to-peer botnet. A compromised computer contacts other compromised computers to receive commands in a peer-to-peer fashion. The botnet is used to install additional pay-per-install malware on the compromised computer and hijack search queries to display advertisements. Its peer-to-peer topology is also used to show fake messages to other users for the purpose of expanding the botnet.〔(【引用サイトリンク】title=W32.Koobface )
It was first detected in December 2008 and a more potent version appeared in March 2009. A study by the Information Warfare Monitor, a joint collaboration from SecDev Group and the Citizen Lab in the Munk School of Global Affairs at the University of Toronto, has revealed that the operators of this scheme have generated over $2 million in revenue from June 2009 to June 2010.〔
Koobface originally spread by delivering Facebook messages to people who are "friends" of a Facebook user whose computer had already been infected. Upon receipt, the message directs the recipients to a third-party website (or another Koobface infected PC), where they are prompted to download what is purported to be an update of the Adobe Flash player. If they download and execute the file, Koobface can infect their system. It can then commandeer the computer's search engine use and direct it to contaminated websites. There can also be links to the third-party website on the Facebook wall of the friend the message came from sometimes having comments like LOL or YOUTUBE. If the link is opened the trojan virus will infect the computer and the PC will become a Zombie or Host Computer.
Among the components downloaded by Koobface are a DNS filter program that blocks access to well known security websites and a proxy tool that enables the attackers to abuse the infected PC. At one time the Koobface gang also used Limbo, a password stealing program.
Several variants of the worm have been identified:
* Worm:Win32/Koobface.gen!F
* Net-Worm.Win32.Koobface.a, which attacks MySpace
* Net-Worm.Win32.Koobface.b, which attacks Facebook〔(Koobface malware distribution technique - automatic user account creation on FaceBook, Twitter, BlogSpot and others )〕
* WORM_KOOBFACE.DC, which attacks Twitter〔(【引用サイトリンク】title=WORM_KOOBFACE )
* W32/Koobfa-Gen, which attacks Facebook, MySpace, hi5, Bebo, Friendster, myYearbook, Tagged, Netlog, Badoo and fubar〔(【引用サイトリンク】title=Sophos stops new version of Koobface social networking worm )〕〔(The Allure of Social Networking, describes Win32/Koobface affecting multiple social networks as described on CA's Security Advisor Research blog )〕
* W32.Koobface.D〔(【引用サイトリンク】title=W32.Koobface.D )
* OSX/Koobface.A, a Mac version which spreads via social networks such as Facebook, MySpace and Twitter.〔(【引用サイトリンク】title=Intego Security Memo: Trojan Horse OSX/Koobface.A Affects Mac OS X Mac – Koobface Variant Spreads via Facebook, Twitter and More - The Mac Security Blog )
In January 2012, the ''New York Times'' reported〔(Web Gang Operating in the Open )〕 that Facebook was planning to share information about the Koobface gang, and name those it believed were responsible. Investigations by German researcher Jan Droemer〔(【引用サイトリンク】title=The Koobface malware gang – exposed! - Naked Security )〕 and the University of Alabama at Birmingham's Center for Information Assurance and Joint Forensics Research〔(【引用サイトリンク】title=Facebook credits UAB with stopping international cyber criminals, donates $250,000 to school )〕 were said to have helped uncover the identities of those responsible.
Facebook finally revealed the names of the suspects behind the worm on January 17, 2012. They include Stanislav Avdeyko (leDed), Alexander Koltyshev (Floppy), Anton Korotchenko (KrotReal), Roman P. Koturbach (PoMuc), Svyatoslav E. Polichuck (PsViat and PsycoMan). They are based in St. Petersburg, Russia. The group is sometimes referred to as Ali Baba & 4 with Stanislav Avdeyko as the leader. The investigation also connected Avdeyko with CoolWebSearch spyware.〔

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Koobface」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.