Necurs botnet

The Necurs botnet is a distributor of many pieces of malware, most notably Locky.

Reports

Around June 1, 2016, the botnet went offline, perhaps due to a glitch in the command and control server running Necurs. However, three weeks later, Jon French from AppRiver discovered a spike in spam emails, signifying either a temporary spike in the botnet's activity or return to its normal pre-June 1 state.[1][2]

Distributed malware[3]

gollark: But a virus and something which is detected as a virus are different.
gollark: You probably can't outside of the omnipresent media stack bugs.
gollark: X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* you, then.
gollark: It would be really stupid if that were possible.
gollark: If it does actually display a warning outside of the video, I would wildly guess that it works by shipping some small part of actual malware which Defender detects inside the video, and then expecting it to scan things in the browser cache or something.

See also

References


This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.