Back to Results
First PageMeta Content
DLD / Server / Dynamic-link library / Trojan horses / System software / Software / Computing


VOLATILE CEDAR THREAT INTELLIGENCE AND RESEARCH MARCH 30, 2015 TA BLE O F CO N TE N TS EXECUTIVE SUMMARY........................................................................................ 3
Add to Reading List

Document Date: 2015-03-31 09:14:56


Open Document

File Size: 1,79 MB

Share Result on Facebook

Company

CHECK POINT / BLE O F CO / Check Point Software Technologies Ltd. / /

Country

Israel / Lebanon / /

Facility

C Port / /

IndustryTerm

pre-installed web shell / web shell code / external mass storage device / writable mass storage device / updater server / web servers / target server / obfuscation algorithm / secure internal networks / operational mass storage devices / static updater server / network inspection devices / web shell / victim server / server infrastructure / communication algorithm / attack tools / detection tools / targeted internal network / public web servers / protection software / server administration utilities / social media accounts / static server / automated security tools / attacker / Internet Explorer / manual online hacking / internal network / /

OperatingSystem

Microsoft Windows / /

Person

Volatile Cedar / /

Position

EXECUTIVE / administrator / logger / /

ProgrammingLanguage

CEDAR / C / Python / /

Technology

communication algorithm / CONTROL NETWORK / AV / ASCII encoding algorithm / DNS / ASCII / API / HTTP / DGA algorithm / operating system / obfuscation algorithm / /

SocialTag