![]() The following image shows a webpage mimicking a software crack download which delivers a variant of Glupteba to users instead of the promised software. ![]() For a period of time, we observed thousands of instances of malicious Glupteba downloads per day. The Glupteba malware family is primarily distributed through pay per install (PPI) networks and via traffic purchased from traffic distribution systems (TDS). ![]() TAG has observed the botnet targeting victims worldwide, including the US, India, Brazil and Southeast Asia. ![]() Glupteba is known to steal user credentials and cookies, mine cryptocurrencies on infected hosts, deploy and operate proxy components targeting Windows systems and IoT devices. However, the operators of Glupteba are likely to attempt to regain control of the botnet using a backup command and control mechanism that uses data encoded on the Bitcoin blockchain. We believe this action will have a significant impact on Glupteba's operations. We use our research to continuously improve the safety and security of our products and share this intelligence with the community to benefit the internet as a whole.Īs announced today, Google has taken action to disrupt the operations of Glupteba, a multi-component botnet targeting Windows computers. Google TAG actively monitors threat actors and the evolution of their tactics and techniques.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |