Results for "bunitu"
August 5, 2015 - Is your VPN really safe? Bunitu infected PCs serve as free exit nodes.
July 13, 2015 - The Bunitu Proxy Trojan is dropped via the Neutrino EK. We take a deep technical dive into it.
February 12, 2019 - We review the top exploit kits in this winter 2019 snapshot.
June 12, 2018 - In this Spring 2018 snapshot, we review the top exploit kits observed in the wild.
September 5, 2017 - A look at how expired domain names can be turned into a lucrative malicious traffic redirection tool.
November 9, 2016 - In this post, we review the changes in the exploit kit landscape over the past months by looking at new arrivals and departures.
Botnets are networks of computers infected by a botnet agent that are under hidden control of a third party. They are used to execute various commands ordered by the attacker. Most common uses of botnets are criminal operations that require distributed resources, such as DDoS attacks on selected targets, spam campaigns, and performing click fraud. Often, the botnet agent is ordered to download and install additional payloads or to steal data from the local computer.
From the moment of infection, botnet agents keep in touch with their remote Command-and-Control server (C&C). The communication can be carried by various means, and cybercriminals keep on inventing in new methods to hide their data transmission channels. There have been some unusual ways via social media like Twitter or reddit to send commands. However, the most common implementation of the C&C is a web-application, contacted by the client via simple HTTP requests.
November 17, 2015 - Massive malvertising campaign targets lower quality traffic sites.
August 11, 2015 - A compilation of notable security news and blog posts from August 02 to 08.