Necurs botnet
The Necurs botnet is a distributor of many pieces of malware, most notably Locky.
Reports
Around June 1, 2016, the botnet went offline, perhaps due to a glitch in the command and control server running Necurs. However, three weeks later, Jon French from AppRiver discovered a spike in spam emails, signifying either a temporary spike in the botnet's activity or return to its normal pre-June 1 state.[1][2]
Distributed malware[3]
gollark: https://www.anandtech.com/show/16010/hot-chips-2020-live-blog-silicon-photonics-for-ai-600pm-pt
gollark: I'm pretty sure they just use it to do big matrix multiplications mostly.
gollark: There's one company which apparently has optronic AI inference hardware.
gollark: ++remind 3mo redeploy rebees
gollark: * Sad!
See also
- Conficker
- Command and control (malware)
- Gameover ZeuS
- Operation Tovar
- Timeline of computer viruses and worms
- Tiny Banker Trojan
- Torpig
- Zeus (malware)
- Zombie (computer science)
References
- French, Jon. "Necurs BotNet Back With A Vengeance Warns AppRiver". Retrieved 27 June 2016.
- "Pump and dump spam: Incapta Inc (INCT)". Retrieved 22 Mar 2017.
- "Hackers behind Locky and Dridex start spreading new ransomware". Retrieved 27 June 2016.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.