Detecting and Containing IRC-Controlled Trojans: When Firewalls, AV, and IDS Are Not Enough
This paper discusses IRC-based trojans as a distinctly underestimated class of malicious activity, and how real time security event monitoring is the key to identifying and containing similar compromises. It discusses the general methodology used to discover, track, and stop such malicious activity by presenting a real-world case study. Full Story