The-binary : Summary



A suspicious file, named "the-binary", was found on a compromised honeypot from the honeynet at



This malicious tool, invisible for the most users, allows an intruder to fully manage a compromised system, and launch networked attacks against others computers.



By installing and using this tool on compromised systems, an intruder can use all of those systems to start attacks against a unique target on the Internet. It is therefore almost painfull to precisely locate the intruder, as the tool easily hides his origin. Moreover, this tool uses a particular communication protocol, never seen before, to exchange information over networks.



Do not install or run unknown files on your system..
Keep your computer up to date, and always install the latest version of your programs..