Tag

trojan

1 views collected around this technical thread.

Efficient Ops
Efficient Ops
Dec 18, 2018 · Information Security

How the “DriverLife” Trojan Leverages EternalBlue for Rapid Worm‑Like Spread

On December 14, Tencent's security intelligence team uncovered a “DriverLife” Trojan that exploited the high‑severity EternalBlue vulnerability to propagate like a worm, infecting up to 100,000 users within two hours, and detailed its infection chain, malicious payloads, and mitigation recommendations.

EternalBlueinformation securitymalware analysis
0 likes · 7 min read
How the “DriverLife” Trojan Leverages EternalBlue for Rapid Worm‑Like Spread
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Aug 20, 2017 · Information Security

How a Web‑Ad Trojan Exploits IE to Deploy Crypto Mining

Tencent's security lab uncovered a large‑scale trojan spread via pornographic web ads that exploits the CVE‑2016‑0189 IE vulnerability, installs a backdoor, and runs a Zcash mining program, while also distributing Linux malware and controlling numerous C&C servers across Chinese provinces.

CVE-2016-0189IE vulnerabilitycrypto mining
0 likes · 8 min read
How a Web‑Ad Trojan Exploits IE to Deploy Crypto Mining
Architect
Architect
Dec 11, 2015 · Information Security

Detailed Analysis of a Targeted Trojan Distributed via a Fake Interview Outline

The article presents a comprehensive technical analysis of a sophisticated Windows trojan that masquerades as a Word document, detailing its delivery method, file extraction process, registry modifications, remote‑control capabilities, and the organized, targeted attack infrastructure behind it.

C2 infrastructureWindowsinformation security
0 likes · 10 min read
Detailed Analysis of a Targeted Trojan Distributed via a Fake Interview Outline