![]() It’s capable of sending the following to a cybercriminal’s server: The information could be used to target vulnerable systems for further attacks-such as those running outdated versions of programs containing known vulnerabilities.Ī later payload introduced Trojan.Nyetya, which may attempt to maliciously modify the Windows Registry of the infected computer. The malware gathers a complete list of running processes, MAC addresses of network interfaces, and installed software. ![]() This program builds a complete picture of the local network and the infected device itself. The first payload installed a piece of spyware called Floxif on users’ machines.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |