Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Necurs botnet

From Wikipedia, the free encyclopedia
Distributor of malware

TheNecurs botnet is a distributor of many pieces of malware, most notablyLocky.

Reports

[edit]

Around June 1, 2016, thebotnet went offline, perhaps due to aglitch in thecommand and control server running Necurs. However, three weeks later, Jon French fromAppRiver discovered a spike inspam emails, signifying either a temporary spike in the botnet's activity or return to its normal pre-June 1 state.[1][2]

In a 2020 report, it was noted to have particularly targeted India, Southeast Asia, Turkey and Mexico.[3]

Distributed malware

[edit]

Source:[4]

See also

[edit]

References

[edit]
  1. ^French, Jon (27 June 2016)."Necurs BotNet Back With A Vengeance Warns AppRiver". Retrieved27 June 2016.
  2. ^"Pump and dump spam: Incapta Inc (INCT)". Retrieved22 Mar 2017.
  3. ^"Microsoft Hijacks Necurs Botnet that Infected 9 Million PCs Worldwide".The Hacker News.
  4. ^"Hackers behind Locky and Dridex start spreading new ransomware". Retrieved27 June 2016.
Hacking in the 2010s
Major incidents
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Hacktivism
Groups
Individuals
Majorvulnerabilities
publiclydisclosed
Malware
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Stub icon

Thismalware-related article is astub. You can help Wikipedia byadding missing information.

Retrieved from "https://en.wikipedia.org/w/index.php?title=Necurs_botnet&oldid=1276672780"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp