词条 | Necurs botnet |
释义 |
The Necurs botnet is a distributor of many pieces of malware, most notably Locky. ReportsAround June 1, 2016, the botnet went offline, perhaps due to a glitch in the command and control server running Necurs. However, three weeks later, Jon French from AppRiver discovered a spike in spam emails, signifying either a temporary spike in the botnet's activity or return to its normal pre-June 1 state.[1] In late March, 2017, the botnet began to send spam emails as part of a pump and dump scam.[2][3] ==Distributed malware[4]==
==See also==
References1. ^{{cite web|last1=French|first1=Jon|title=Necurs BotNet Back With A Vengeance Warns AppRiver|url=http://www.informationsecuritybuzz.com/hacker-news/necurs-botnet-back-vengeance-warns-appriver/|accessdate=27 June 2016}} {{malware-stub}}2. ^{{cite web|title=Necurs Botnet Shifts from Ransomware to Pump-and-Dump Scam|url=http://www.bankinfosecurity.com/necurs-botnet-shifts-from-ransomware-to-pump-and-dump-scam-a-978/|accessdate=22 Mar 2017}} 3. ^{{cite web|title=Pump and dump spam: Incapta Inc (INCT)|url=http://blog.dynamoo.com/2017/03/pump-and-dump-spam-incapta-inc-inct.html|accessdate=22 Mar 2017}} 4. ^{{cite web|title=Hackers behind Locky and Dridex start spreading new ransomware|url=http://www.itpro.co.uk/security/26799/hackers-behind-locky-and-dridex-start-spreading-new-ransomware|accessdate=27 June 2016}} 1 : Botnets |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。