Last week, McAfee released a tool named AmIPinkC2, a Windows command-line application that removes remnant files of Pinkslipbot infections that allow the malware to continue to use previously infected computers as proxy relays, even if the original malware's binary has been cleaned and removed from infected hosts. The malware in question is Pinkslipbot, a banking trojan that appeared in 2007 and is also tracked under three other names, such as Qakbot, Qbot, and PinkSlip. http://www.mcafee.com/activate Pinkslipbot is a well-known and dangerous threat Pinkslipbot is a well-known threat on the malware landscape, mainly due to its specific targeting. Its authors aren't going after regular users, but have historically targeted North American companies, especially those in lucrative industry sectors, such as corporate banking, financial institutions, treasury services, and others. mcafee.com/activate This banking trojan isn't always active, and it keeps com...
Comments
Post a Comment