Type
Campaign
Actors
Windigo operator
Pub. date
March 18, 2014
Initial access
Supply chain vector
Impact
Resource hijacking
Observed techniques
Create SSH backdoor
Observed tools
Ebury
References
https://www.welivesecurity.com/2014/03/18/operation-windigo-the-vivisection-of-a-large-linux-server-side-credential-stealing-malware-campaign/https://web-assets.esetstatic.com/wls/2014/03/operation_windigo.pdf
Status
Stub
Last edited
Nov 3, 2024 7:00 AM