Necurs botnet
The Necurs botnet is a distributor of many pieces of malware, most notably Locky.
Reports
Around June 1, 2016, the botnet went offline, perhaps due to a glitch in the command and control server running Necurs. However, three weeks later, Jon French from AppRiver discovered a spike in spam emails, signifying either a temporary spike in the botnet's activity or return to its normal pre-June 1 state.[1][2]
Distributed malware[3]
gollark: But a virus and something which is detected as a virus are different.
gollark: You probably can't outside of the omnipresent media stack bugs.
gollark: X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* you, then.
gollark: It would be really stupid if that were possible.
gollark: If it does actually display a warning outside of the video, I would wildly guess that it works by shipping some small part of actual malware which Defender detects inside the video, and then expecting it to scan things in the browser cache or something.
See also
- Conficker
- Command and control (malware)
- Gameover ZeuS
- Operation Tovar
- Timeline of computer viruses and worms
- Tiny Banker Trojan
- Torpig
- Zeus (malware)
- Zombie (computer science)
References
- French, Jon. "Necurs BotNet Back With A Vengeance Warns AppRiver". Retrieved 27 June 2016.
- "Pump and dump spam: Incapta Inc (INCT)". Retrieved 22 Mar 2017.
- "Hackers behind Locky and Dridex start spreading new ransomware". Retrieved 27 June 2016.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.