P2P botnet Interplanetary Storm accounts more than 9000 devices

Bitdefender experts gave a detailed description of the work of the P2P botnet Interplanetary Storm (aka IPStorm), which uses infected devices as a proxy. According to researchers, the botnet includes more than 9,000 hosts (according to other sources, the number of infected devices exceeds 13,500), the vast majority of which are running Android, and about… Continue reading P2P botnet Interplanetary Storm accounts more than 9000 devices

IPStorm botnet now attacks Android, macOS and Linux devices

For the first time, Anomali specialists noticed the IPStorm in June 2019, and then it attacked only Windows machines. Now it began to attack devices on Android, macOS and Linux. Previously, the botnet included about 3,000 infected systems, but even then the researchers discovered several strange and interesting features that were unique to IPStorm. For… Continue reading IPStorm botnet now attacks Android, macOS and Linux devices

Twitter and Graphika neutralized Dracula propaganda botnet

Experts from the Graphika research group talked about how they managed to find and neutralize the Dracula botnet on Twitter. It consisted of about 3,000 bots that spread pro-Chinese political spam and repeated official messages spread through government accounts. The botnet was discovered thanks to a rather exotic quirk of its creators: the vast majority… Continue reading Twitter and Graphika neutralized Dracula propaganda botnet

Prometei botnet uses SMB for distribution

Cisco Talos has discovered a new botnet, Prometei, which was active since March 2020 and focused on mining the Monero (XMR) cryptocurrency. The researchers note that the Prometei botnet intensively uses the SMB protocol for distribution. The malware mainly attacks users from the USA, Brazil, Pakistan, China, Mexico and Chile. During four months of activity,… Continue reading Prometei botnet uses SMB for distribution

Microsoft recommends Exchange administrators to disable SMBv1

Microsoft strongly recommends administrators disable the SMBv1 protocol on Exchange servers to protect against threats that exploit its vulnerabilities. Let me remind you that Microsoft has been implementing a systematic refusal to use the outdated SMBv1 for a long time. So, since 2016, the company has advised administrators to withdraw from SMBv1 support since this… Continue reading Microsoft recommends Exchange administrators to disable SMBv1

What is a Botnet: Signs Your Computer Is Part Of A Botnet

Botnets are a new reality that seems to have somehow imperceptibly swooped upon us. In fact, the first documented botnet – a network of bots – was created as early as 2001. Today some botnets include tens of millions of machines. And these computers perform the tasks they are given in complete ignorance of their… Continue reading What is a Botnet: Signs Your Computer Is Part Of A Botnet

Scariest Online Threats You Should Know About

Scariest Online Threats You Should Know About

Today almost every aspect of our life has moved online. And we can be quite happy about it because you no longer need to waste a whole hour to commute to work, you don’t need to go to the bank to make a deposit or you don’t need to go to a shopping center to… Continue reading Scariest Online Threats You Should Know About

Warning Signs That Your Computer Is Infected: Does Your Computer Have Viruses

Something is off with your device and you have the premonitions why. You got infected with a computer virus. But put the panic aside and before you do anything in a rush have some knowledge in order to know where to start dealing with the problem. And actually to learn what the problem is because… Continue reading Warning Signs That Your Computer Is Infected: Does Your Computer Have Viruses

The Danger of Botnet Network: How to Detect Botnet on You PC

The word “botnet” is now ubiquitous, and almost all users know what it means. This is not surprising because this network can be virtually any device with Internet access. Such a network can infect many devices, such as desktop computers, smartphones, and home Wi-Fi routers. All of them may one day have weapons in the… Continue reading The Danger of Botnet Network: How to Detect Botnet on You PC