请输入您要查询的百科知识:

 

词条 Necurs botnet
释义

  1. Reports

  2. References

The Necurs botnet is a distributor of many pieces of malware, most notably Locky.

Reports

Around June 1, 2016, the botnet went offline, perhaps due to a glitch in the command and control server running Necurs. However, three weeks later, Jon French from AppRiver discovered a spike in spam emails, signifying either a temporary spike in the botnet's activity or return to its normal pre-June 1 state.[1] In late March, 2017, the botnet began to send spam emails as part of a pump and dump scam.[2][3]

==Distributed malware[4]==

  • Bart
  • Dridex
  • Locky
  • RockLoader
  • Globeimposter

==See also==

  • Conficker
  • Command and control (malware)
  • Gameover ZeuS
  • Operation Tovar
  • Timeline of computer viruses and worms
  • Tiny Banker Trojan
  • Torpig
  • Zeus (malware)
  • Zombie (computer science)

References

1. ^{{cite web|last1=French|first1=Jon|title=Necurs BotNet Back With A Vengeance Warns AppRiver|url=http://www.informationsecuritybuzz.com/hacker-news/necurs-botnet-back-vengeance-warns-appriver/|accessdate=27 June 2016}}
2. ^{{cite web|title=Necurs Botnet Shifts from Ransomware to Pump-and-Dump Scam|url=http://www.bankinfosecurity.com/necurs-botnet-shifts-from-ransomware-to-pump-and-dump-scam-a-978/|accessdate=22 Mar 2017}}
3. ^{{cite web|title=Pump and dump spam: Incapta Inc (INCT)|url=http://blog.dynamoo.com/2017/03/pump-and-dump-spam-incapta-inc-inct.html|accessdate=22 Mar 2017}}
4. ^{{cite web|title=Hackers behind Locky and Dridex start spreading new ransomware|url=http://www.itpro.co.uk/security/26799/hackers-behind-locky-and-dridex-start-spreading-new-ransomware|accessdate=27 June 2016}}
{{malware-stub}}

1 : Botnets

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/12 15:12:10