No rest for the Bagles – or for the virus analysts

Last night was a busy one. Between yesterday evening and this morning, we intecepted 12 programs created by the authors of Bagle: 5 Trojan downloaders (classifed as Trojan-Downloader.Win32.Bagle.d – h) and 7 worms (Email-Worm.Win32.Bagle.eo – eu.)

All of this activity is with the aim of finding new machines to infect to keep the Bagle botnet running.

Our antivirus databases detect all the malicious programs mentioned above. As I say, it was a busy night.

No rest for the Bagles – or for the virus analysts

Your email address will not be published. Required fields are marked *



APT trends report Q3 2022

This is our latest summary of advanced persistent threat (APT) activities, focusing on events that we observed during Q3 2022.

APT10: Tracking down LODEINFO 2022, part I

The first part of this report will provide technical analysis of the new infection methods such as SFX files and DOWNIISSA, a new downloader shellcode used to deploy the LODEINFO backdoor.

Subscribe to our weekly e-mails

The hottest research right in your inbox