Results for "bunitu"

August 5, 2015 - Is your VPN really safe? Bunitu infected PCs serve as free exit nodes.

CONTINUE READING No Comments

July 13, 2015 - The Bunitu Proxy Trojan is dropped via the Neutrino EK. We take a deep technical dive into it.

CONTINUE READING No Comments

February 12, 2019 - We review the top exploit kits in this winter 2019 snapshot.

CONTINUE READING No Comments

June 12, 2018 - In this Spring 2018 snapshot, we review the top exploit kits observed in the wild.

CONTINUE READING No Comments

September 5, 2017 - A look at how expired domain names can be turned into a lucrative malicious traffic redirection tool.

CONTINUE READING No Comments

November 9, 2016 - In this post, we review the changes in the exploit kit landscape over the past months by looking at new arrivals and departures.

CONTINUE READING No Comments

Botnets

Botnets are networks of computers infected by a botnet agent that are under hidden control of a third party. They are used to execute various commands ordered by the attacker. Most common uses of botnets are criminal operations that require distributed resources, such as DDoS attacks on selected targets, spam campaigns, and performing click fraud. Often, the botnet agent is ordered to download and install additional payloads or to steal data from the local computer.

From the moment of infection, botnet agents keep in touch with their remote Command-and-Control server (C&C). The communication can be carried by various means, and cybercriminals keep on inventing in new methods to hide their data transmission channels. There have been some unusual ways via social media like Twitter or reddit to send commands. However, the most common implementation of the C&C is a web-application, contacted by the client via simple HTTP requests.

CONTINUE READING No Comments

November 17, 2015 - Massive malvertising campaign targets lower quality traffic sites.

CONTINUE READING No Comments

August 11, 2015 - A compilation of notable security news and blog posts from August 02 to 08.

CONTINUE READING No Comments

July 27, 2015 - Malvertising is full of surprises. This one leads to a rogue baseball site launching the Neutrino Exploit Kit.

CONTINUE READING No Comments

Select your language