The Latest in IT Security

ChewBacca: Infostealer Malware Uses Tor for C&C Infrastructure

18
Dec
2013

Researchers from Kaspersky have come across a new piece of malware that uses the Tor anonymity network to host its malicious infrastructure. This feature is being integrated into more and more pieces of malware, including ZeuS and the Atrax crimeware kit.

The threat, dubbed ChewBacca, is currently n…

Comments are closed.

Categories

THURSDAY, DECEMBER 13, 2018
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks