Cutwail botnet on spam rampage, delivers Cridex worm
Posted on 25.01.2013
Since its inception some six years ago, the Cutwail / Pandex botnet experienced its fair share of setbacks, but it's still going strong.

The main reason for its existence is to send out millions of spam messages per day, and it occasionally also harvests information such as email addresses in order to include them in new spam campaigns.

As the Virut botnet a week ago, this most resilient of botnets has recently been rented by cyber crooks wishing to infect computers with malware - in this case, the backdoor Cridex worm.

"The attackers have managed to host a malicious HTML file at a legitimate web site, which has been compromised. This file would then redirect the user to a Blackhole exploit kit, which would deliver W32.Cridex to the compromised computer," Symantec researchers explained.

The victims would be taken to the compromised web site if they clicked on links contained in bogus spam emails such as this one:

The majority of computers enslaved in the Cutwail botnet are at this time located in the U.S., India, the Russian Federation and Mexico. The servers hosting the Blackhole exploit kit are in Germany, the Russian Federation and Lithuania.

As always, users are advised to keep their OS and software updated, as well as avoid clicking on links contained in unsolicited emails.


10 practical security tips for DevOps

By working with the DevOps team, you can ensure that the production environment is more predictable, auditable and more secure than before. The key is to integrate your security requirements into the DevOps pipeline.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Tue, Mar 31st