logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • ASEC Weekly Malware Statistics (January 30th, 2023 – February 5th, 2023)
  • Major CrackDown – Police Hacked Exclu ‘secure’ Cybercriminal Message Platform
  • Vulnerability Provided Access to Toyota Supplier Management Network
  • OpenSSL fixes High Severity data-stealing bug – patch now!
  • PixPirate – Advanced Android Threat Targets Brazilian Financial Organizations

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2022-46842 (js_help_desk) 2 February 2023
  • CVE-2022-46815 (conditional_shipping_for_woocommerce) 2 February 2023
  • CVE-2022-45807 (wp_mail_log) 2 February 2023
  • CVE-2022-45067 (exclusive_addons_for_elementor) 2 February 2023
  • CVE-2022-40692 (sunshine_photo_cart) 2 February 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

After 10 years, Phorpiex botnet is still active

Posted on 20 October 2019

From 2-spyware.com

Phorpiex botnet used in sextortion email spam campaigns collects $115K

After being active for around 10 years, Phorpiex (aka Trik) botnet has recently been delivering millions of sextortion messages to random users via email spam campaigns. Check Point researchers found that this botnet is now running over 450,000 affected hosts.

Read more…

Posted in News

Post navigation

Previous post: The automated system leaving welfare recipients cut off with nowhere to turn
Next post: Exclusive: Huawei in early talks with U.S. firms to license 5G platform – Huawei executive
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.