Threat Database Malware Pony Botnet

Pony Botnet

By Domesticus in Malware

Threat Scorecard

Ranking: 16,588
Threat Level: 80 % (High)
Infected Computers: 617
First Seen: July 9, 2013
Last Seen: July 13, 2023
OS(es) Affected: Windows

The Pony botnet is a very large botnet that was uncovered recently, in the Summer of 2013. The Pony botnet is similar to some of the most common botnets active today. The Pony botnet controller includes a control panel and advanced features that allow the criminals controlling the Pony botnet to gather data, keep records and statistics and control the botnet effectively from a single location. There's a sharp rise of attacks involving the Pony botnet and malware designed to integrate infected computer systems into this dangerous botnet. Currently, the Pony botnet is in version 1.9 and has the capacity to steal hundreds of thousands of passwords and sensitive data per day.

The Attacks Involving the Pony Botnet

The Pony botnet has been involved in a large number of attacks. The most affected Web browser is Firefox, with Google Chrome in second place and Internet Explorer in third. The Pony botnet can also steal information from email clients and FTP clients, with the most affected email client being Outlook. However, the main purpose of the Pony botnet is to steal sensitive information such as website login credentials and passwords for email and social networks. This information can then be used to send out massive quantities of spam email messages or steal money from victims. Among the most affected websites are Facebook, Yahoo and Google, with hundreds of thousands of stolen email accounts and thousands of stolen FTP credentials.

Avoid Becoming a Victim of the Pony Botnet

A botnet is essentially a large network of computer systems infected with malware that allows criminals to control them all simultaneously. This control allows criminals to carry out massive Distributed Denial of Service attacks or send out billions of spam email messages. To become part of a botnet, a computer will usually have to be infected with a dangerous Trojan infection that allows criminals to gain remote access to the infected computer. To prevent these kinds of attacks, it is important to protect your computer with a reliable anti-malware program which should be always kept up to date.

SpyHunter Detects & Remove Pony Botnet

File System Details

Pony Botnet may create the following file(s):
# File Name MD5 Detections
1. b9f28645fa5d37366c55aa9c39756792db74e6570df8a602414c1ce21e16ec9e.exe de1c9462d43c8a6a17a101f4a4840bd6 2
2. 5d455f154ee0a74c1315d4a84b9b5505 5d455f154ee0a74c1315d4a84b9b5505 1
3. file.exe 5c91b269dd6b819a0b5796da12a4999d 0
4. file.exe 0e9a211f76500fcb3f47f4ea3c94b1c5 0
5. file.exe d767d1af18b60dcd13f67c222965b36c 0
6. file.exe d8add16bd44a8cbb423410874eb9e24e 0
7. file.exe 81c606efc54e7b374c8564e2a0e1ae97 0
8. file.exe 13d5bf1dc0dd5787fd3ef2bb8ce4e968 0
9. 92fd5a019bf7a818e7a242b4e2b2ad76 92fd5a019bf7a818e7a242b4e2b2ad76 0

Registry Details

Pony Botnet may create the following registry entry or registry entries:
Regexp file mask
%APPDATA%\hgftvcxzwsiklon.exe
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\netfile.vbe
%APPDATA%\netfile.exe
%AppData%\Pony.exe

Trending

Most Viewed

Loading...