Necurs Botnet
   HOME

TheInfoList



OR:

The Necurs botnet is a distributor of many pieces of malware, most notably
Locky Locky is Ransomware, ransomware malware released in 2016. It is delivered by email (that is allegedly an invoice requiring payment) with an attached Microsoft Word document that contains Macro virus, malicious macros. When the user opens the docu ...
.


Reports

Around June 1, 2016, the
botnet A botnet is a group of Internet-connected devices, each of which runs one or more Internet bot, bots. Botnets can be used to perform distributed denial-of-service attack, distributed denial-of-service (DDoS) attacks, steal data, send Spamming, sp ...
went offline, perhaps due to a
glitch A glitch is a short-lived technical fault, such as a transient one that corrects itself, making it difficult to troubleshoot. The term is particularly common in the computing and electronics industries, in circuit bending, as well as among pl ...
in the command and control server running Necurs. However, three weeks later, Jon French from AppRiver discovered a spike in spam emails, signifying either a temporary spike in the botnet's activity or return to its normal pre-June 1 state. In a 2020 report, it was noted to have particularly targeted India, Southeast Asia, Turkey and Mexico.


Distributed malware

Source: * Bart *
Dridex Dridex, also known as Bugat and Cridex, is a type of malware that specializes in stealing bank credentials through a system that utilizes macros from Microsoft Word. It primarily targets Windows users who open malicious email attachments in Wor ...
*
Locky Locky is Ransomware, ransomware malware released in 2016. It is delivered by email (that is allegedly an invoice requiring payment) with an attached Microsoft Word document that contains Macro virus, malicious macros. When the user opens the docu ...
* RockLoader * Globeimposter


See also

*
Conficker Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008. It uses flaws in Windows OS software (MS08-067 / CVE-2008-4250) and dictionary atta ...
*
Command and control (malware) A botnet is a group of Internet-connected devices, each of which runs one or more bots. Botnets can be used to perform distributed denial-of-service (DDoS) attacks, steal data, send spam, and allow the attacker to access the device and its conne ...
*
Gameover ZeuS GameOver ZeuS (GOZ), also known as peer-to-peer (P2P) ZeuS, ZeuS3, and GoZeus, is a Trojan horse (computing), Trojan horse developed by Russian cybercriminal Evgeniy Bogachev. Created in 2011 as a successor to Jabber Zeus, another project of Bog ...
*
Operation Tovar Operation Tovar was an international collaborative operation carried out by law enforcement agencies from multiple countries against the Gameover ZeuS botnet, which was believed by the investigators to have been used in bank fraud and the distrib ...
*
Timeline of computer viruses and worms This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events. 1960s * John von Neumann's article on the "Theory of ...
* Tiny Banker Trojan *
Torpig Torpig, also known as Anserin or Sinowal is a type of botnet spread through systems compromised by the Mebroot rootkit by a variety of trojan horses for the purpose of collecting sensitive personal and corporate data such as bank account and credit ...
*
Zeus (malware) Zeus is a Trojan horse (computing), Trojan horse malware package that runs on versions of Microsoft Windows. It is often used to steal Banking, banking information by man-in-the-browser keystroke logging and form grabbing. Zeus is spread main ...
* Zombie (computer science)


References

Botnets Cybercrime in India {{malware-stub