Misplaced Pages

Necurs botnet

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Distributor of malware

The Necurs botnet is a distributor of many pieces of malware, most notably Locky.

Reports

Around June 1, 2016, the botnet went offline, perhaps due to a glitch in the command and control server running Necurs. However, three weeks later, Jon French from AppRiver discovered a spike in spam emails, signifying either a temporary spike in the botnet's activity or return to its normal pre-June 1 state.

In a 2020 report, it was noted to have particularly targeted India, Southeast Asia, Turkey and Mexico.

Distributed malware

See also

References

  1. French, Jon (27 June 2016). "Necurs BotNet Back With A Vengeance Warns AppRiver". Retrieved 27 June 2016.
  2. "Pump and dump spam: Incapta Inc (INCT)". Retrieved 22 Mar 2017.
  3. "Microsoft Hijacks Necurs Botnet that Infected 9 Million PCs Worldwide". The Hacker News.
  4. "Hackers behind Locky and Dridex start spreading new ransomware". Retrieved 27 June 2016.
Hacking in the 2010s
← 2000s Timeline 2020s →
Major incidents
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Hacktivism
Advanced
persistent threats
Individuals
Major vulnerabilities
publicly disclosed
Malware
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Stub icon

This malware-related article is a stub. You can help Misplaced Pages by expanding it.

Categories: