Necurs botnet

Distributor of malware

The Necurs botnet is a distributor of many pieces of malware, most notably Locky.

Reports

Around June 1, 2016, the botnet went offline, perhaps due to a glitch in the command and control server running Necurs. However, three weeks later, Jon French from AppRiver discovered a spike in spam emails, signifying either a temporary spike in the botnet's activity or return to its normal pre-June 1 state.[1][2]

In a 2020 report, it was noted to have particularly targeted India, Southeast Asia, Turkey and Mexico.[3]

Distributed malware[4]

  • Bart
  • Dridex
  • Locky
  • RockLoader
  • Globeimposter

See also

References

  1. ^ French, Jon (27 June 2016). "Necurs BotNet Back With A Vengeance Warns AppRiver". Retrieved 27 June 2016.
  2. ^ "Pump and dump spam: Incapta Inc (INCT)". Retrieved 22 Mar 2017.
  3. ^ "Microsoft Hijacks Necurs Botnet that Infected 9 Million PCs Worldwide". The Hacker News.
  4. ^ "Hackers behind Locky and Dridex start spreading new ransomware". Retrieved 27 June 2016.
  • v
  • t
  • e
Hacking in the 2010s
← 2000s Timeline 2020s →
Major incidents
2010
  • Operation Aurora (publication of 2009 events)
  • Australian cyberattacks
  • Operation Olympic Games
  • Operation ShadowNet
  • Operation Payback
2011
2012
2013
2014
2015
2016
2017
2018
2019
HacktivismAdvanced
persistent threatsIndividualsMajor vulnerabilities
publicly disclosed
Malware
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Stub icon

This malware-related article is a stub. You can help Wikipedia by expanding it.

  • v
  • t
  • e