Pony Botnet DescriptionThe Pony botnet is a very large botnet that was uncovered recently, in the Summer of 2013. The Pony botnet is similar to some of the most common botnets active today. The Pony botnet controller includes a control panel and advanced features that allow the criminals controlling the Pony botnet to gather data, keep records and statistics and control the botnet effectively from a single location. There's a sharp rise of attacks involving the Pony botnet and malware designed to integrate infected computer systems into this dangerous botnet. Currently, the Pony botnet is in version 1.9 and has the capacity to steal hundreds of thousands of passwords and sensitive data per day.
The Attacks Involving the Pony Botnet
The Pony botnet has been involved in a large number of attacks. The most affected Web browser is Firefox, with Google Chrome in second place and Internet Explorer in third. The Pony botnet can also steal information from email clients and FTP clients, with the most affected email client being Outlook. However, the main purpose of the Pony botnet is to steal sensitive information such as website login credentials and passwords for email and social networks. This information can then be used to send out massive quantities of spam email messages or steal money from victims. Among the most affected websites are Facebook, Yahoo and Google, with hundreds of thousands of stolen email accounts and thousands of stolen FTP credentials.
Avoid Becoming a Victim of the Pony Botnet
A botnet is essentially a large network of computer systems infected with malware that allows criminals to control them all simultaneously. This control allows criminals to carry out massive Distributed Denial of Service attacks or send out billions of spam email messages. To become part of a botnet, a computer will usually have to be infected with a dangerous Trojan infection that allows criminals to gain remote access to the infected computer. To prevent these kinds of attacks, it is important to protect your computer with a reliable anti-malware program which should be always kept up to date.
Infected with Pony Botnet? Scan Your PC for FreeDownload SpyHunter’s Spyware Scanner
to Detect Pony Botnet
Security Doesn't Let You Download SpyHunter or Access the Internet?
Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
- Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
- Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
- Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in 'Safe Mode with Networking' and install SpyHunter in Safe Mode.
- IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.
If you still can't install SpyHunter? View other possible causes of installation issues.
Our MalwareTracker shows malware activity across the world. Explore real-time data of Pony Botnet outbreaks and other threats from global to local level.