Necurs botnet operation dismantled; millions of malicious domains seized

Necurs botnet operation dismantled; millions of malicious domains seized

A coalition of security-minded organizations led by Microsoft struck a major blow against the mighty Necurs botnet — one of the largest in world — dismantling its infrastructure in a global takedown.


Empowered by a court order, Microsoft not only took control of the Necurs operators’ web domains, but it blocked an additional 6 million domains that the company predicted would be used by the cybercriminal organization over the next 25 months. Microsoft executed this preemptive move by analyzing Necurs’ domain name generation (DNG) algorithm, extrapolating future domains based on said algorithm, and then reporting the domains to global registries so they could block them.


Necurs botnet malware is closely associated with the Russian cybercriminal group Evil Corp, which has used its botnet capabilities to distribute Dridex and TrickBot banking malware, the Locky and BitPaymer ransomware, and the Zeus trojan. Last December, the U.S. Justice Department announced that it filed hacking and bank fraud charges against two of its suspected members, including Maksim Yakubets, who has worked for the Russian intellige ..

Support the originator by clicking the read the rest link below.