Software:Necurs botnet
From HandWiki
Short description: Distributor of malware
The Necurs botnet is a distributor of many pieces of malware, most notably Locky.
Reports
Around June 1, 2016, the botnet went offline, perhaps due to a glitch in the command and control server running Necurs. However, three weeks later, Jon French from AppRiver discovered a spike in spam emails, signifying either a temporary spike in the botnet's activity or return to its normal pre-June 1 state.[1][2]
In a 2020 report, it was noted to have particularly targeted India, Southeast Asia, Turkey and Mexico.[3]
Distributed malware[4]
- Bart
- Dridex
- Locky
- RockLoader
- Globeimposter
See also
- Conficker
- Command and control (malware)
- Gameover ZeuS
- Operation Tovar
- Timeline of computer viruses and worms
- Tiny Banker Trojan
- Torpig
- Zeus (malware)
- Zombie (computer science)
References
- ↑ French, Jon (27 June 2016). "Necurs BotNet Back With A Vengeance Warns AppRiver". http://www.informationsecuritybuzz.com/hacker-news/necurs-botnet-back-vengeance-warns-appriver/. Retrieved 27 June 2016.
- ↑ "Pump and dump spam: Incapta Inc (INCT)". http://blog.dynamoo.com/2017/03/pump-and-dump-spam-incapta-inc-inct.html. Retrieved 22 Mar 2017.
- ↑ "Microsoft Hijacks Necurs Botnet that Infected 9 Million PCs Worldwide" (in en). https://thehackernews.com/2020/03/necurs-botnet-takedown.html.
- ↑ "Hackers behind Locky and Dridex start spreading new ransomware". http://www.itpro.co.uk/security/26799/hackers-behind-locky-and-dridex-start-spreading-new-ransomware. Retrieved 27 June 2016.
Original source: https://en.wikipedia.org/wiki/Necurs botnet.
Read more |