Trojan horse using sender policy framework

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

Trojan horse using sender policy framework
Botnet Spachanel
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2013 / 2013-01-25
Editor/Conference Symantec
Link http://www.symantec.com/connect/blogs/trojan-horse-using-sender-policy-framework (Archive copy)
Author Takashi Katsuki
Type Blogpost

Abstract

More recently, I discovered a Trojan horse that uses Sender Policy Framework (SPF), which is an email validation system designed to prevent email spam, to achieve the same goal.

Basically, SPF consists of a domain name server (DNS) request and response. If a sender’s DNS server is set up to use SPF, the DNS response contains the SPF in a text (TXT) record.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1286,
   editor = {Symantec},
   author = {Takashi Katsuki},
   title = {Trojan horse using sender policy framework},
   date = {25},
   month = Jan,
   year = {2013},
   howpublished = {\url{http://www.symantec.com/connect/blogs/trojan-horse-using-sender-policy-framework}},
 }