![]() ![]() The source code is widely available on illegal software servers known as Warez sites new variants are popping up all the time. Variants: Win32/Agobot, Backdoor.Agobot.3.gen,, !poly, and dozens of others. ![]() The Agobot code includes functions that let it check for instructions in specific chat areas. But the attackers did follow a pattern consistent with the Agobot/Phatbot family, which consists of dozens of variants on a worm called Agobot that was created in northern Europe in the late 1990s.ĭescription: When launched on a victim’s computer, Agobot becomes a back door that allows the attacker to control the computer by issuing commands through Internet Relay Chat (IRC). It’s not entirely clear which virus or worm corrupted the machines used in a large-scale distributed denial-of-service attack against Akamai last June.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |