Sub7

Sub7
Original author(s)mobman
Preview release
2.3 / 2010
Written inDelphi
Operating systemMicrosoft Windows
TypeTrojan horse (computing)
Licensefreeware
Websitesub7crew.org

Sub7, or SubSeven or Sub7Server, is a Trojan horse - more specifically a Remote Trojan Horse - program originally released in February 1999.[1][2][3] Its name was derived by spelling NetBus backwards ("suBteN") and swapping "ten" with "seven". As of June 2021, the development of Sub7 is being continued.[4]

Because its typical use is to allow undetected and unauthorized access, Sub7 is usually described as a trojan horse by security experts.[5][2][6][7][8][9] Starting with version 2.1 (1999) it could be controlled via IRC. As one security book phrased it: "This set the stage for all malicious botnets to come."[7] Additionally Sub7 has some features deemed of little use in legitimate remote administration like keystroke logging.[7]

Sub7 worked on the Windows 9x and on the Windows NT family of operating systems, up to and including Windows 8.1.[8]

  1. ^ "Sub7 Legacy". www.sub7crew.org. Retrieved 2021-06-19.
  2. ^ a b John R. Vacca (2013). Network and System Security (2nd ed.). Elsevier. p. 63. ISBN 978-0-12-416695-0.
  3. ^ Lesueur, Jean-Pierre (July 18, 2023). "A Malware restrospective : SubSeven". Medium.
  4. ^ "Sub7 Legacy". www.sub7crew.org. Retrieved 2021-06-19.
  5. ^ Christopher A. Crayton (2003). Security+ Exam Guide. Cengage Learning. p. 340. ISBN 1-58450-251-7.
  6. ^ Mohssen Mohammed; Al-Sakib Khan Pathan (July 2013). Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks. CRC Press. p. 105. ISBN 978-1-4822-1905-0.
  7. ^ a b c Craig Schiller; James R. Binkley (2011). Botnets: The Killer Web Applications. Syngress. p. 8. ISBN 978-0-08-050023-2.
  8. ^ a b Diane Barrett; Todd King (2005). Computer Networking Illuminated. Jones & Bartlett Learning. pp. 521–. ISBN 978-0-7637-2676-8.
  9. ^ Cite error: The named reference PeikariChuvakin2004 was invoked but never defined (see the help page).