Fort Disco
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Ranking: | 16,064 |
Threat Level: | 20 % (Normal) |
Infected Computers: | 743 |
First Seen: | August 16, 2013 |
Last Seen: | May 14, 2023 |
OS(es) Affected: | Windows |
Fort Disco is a dangerous botnet that has been associated with a wave of attacks on blogs and websites that use popular content management systems such as WordPress. Fort Disco attacks have infected more than 25000 targets, mainly infecting blogs and websites with poor security protection or badly implemented content management systems. Fort Disco attacks were first reported by PC security analysts in August of 2013. These attacks have been going on for some time, at least since May of 2013. PC security analysts were able to uncover and start tracking Fort Disco attacks because of exposed Command and Control servers associated with this botnet. It is important to understand the nature of a botnet. These are vast networks of infected computers, which are controlled by criminals in order to carry out coordinated attacks.
The First Step of Fort Disco is to Steal Your Login Data
Fort Disco attacks are designed to infect computers running Windows. Once Fort Disco malware is installed on the victim's computer, Fort Disco connects to a Command and Control server and retrieves a list of commonly used user names and passwords. These include common default passwords such as '123456', 'qwerty', or 'admin', all considered extremely unsafe. The purpose of Fort Disco attacks is to steal login data. Security researchers suspect that the Fort Disco attacks are a prelude to more extensive malware attacks that may be carried out in the future. Fort Disco attacks will typically leave one of two different malware components on the victim's computer. The first of these is a browser hijacker which can take over the victim's Web browser and force it to visit an attack Web page containing the Styx Exploit Kit. The second of these malicious components is a WordPress plug-in that is used to import posts automatically from a blog on Tumblr.
Possible Implications of Fort Disco Attacks
Malware attacks that target Web servers, blogs and websites are particularly alarming because they hold the potential to result in even more extensive damage. The fact that Fort Disco has these types of targets will more likely result in another stage of the attack in which criminals infect a larger number of targets. By compromising a website, it is possible to insert malicious scripts, advertisements and links which can then redirect visitors to attack websites and other malicious content, exponentially increasing the number of victims.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.