Pony Botnet

Pony Botnet Description

Type: Trojan

The Pony botnet is a very large botnet that was uncovered recently, in the Summer of 2013. The Pony botnet is similar to some of the most common botnets active today. The Pony botnet controller includes a control panel and advanced features that allow the criminals controlling the Pony botnet to gather data, keep records and statistics and control the botnet effectively from a single location. There's a sharp rise of attacks involving the Pony botnet and malware designed to integrate infected computer systems into this dangerous botnet. Currently, the Pony botnet is in version 1.9 and has the capacity to steal hundreds of thousands of passwords and sensitive data per day.

The Attacks Involving the Pony Botnet

The Pony botnet has been involved in a large number of attacks. The most affected Web browser is Firefox, with Google Chrome in second place and Internet Explorer in third. The Pony botnet can also steal information from email clients and FTP clients, with the most affected email client being Outlook. However, the main purpose of the Pony botnet is to steal sensitive information such as website login credentials and passwords for email and social networks. This information can then be used to send out massive quantities of spam email messages or steal money from victims. Among the most affected websites are Facebook, Yahoo and Google, with hundreds of thousands of stolen email accounts and thousands of stolen FTP credentials.

Avoid Becoming a Victim of the Pony Botnet

A botnet is essentially a large network of computer systems infected with malware that allows criminals to control them all simultaneously. This control allows criminals to carry out massive Distributed Denial of Service attacks or send out billions of spam email messages. To become part of a botnet, a computer will usually have to be infected with a dangerous Trojan infection that allows criminals to gain remote access to the infected computer. To prevent these kinds of attacks, it is important to protect your computer with a reliable anti-malware program which should be always kept up to date.

Technical Information

File System Details

Pony Botnet creates the following file(s):
# File Name MD5 Detection Count
1 b9f28645fa5d37366c55aa9c39756792db74e6570df8a602414c1ce21e16ec9e.exe de1c9462d43c8a6a17a101f4a4840bd6 2
2 5d455f154ee0a74c1315d4a84b9b5505 5d455f154ee0a74c1315d4a84b9b5505 1
3 92fd5a019bf7a818e7a242b4e2b2ad76 92fd5a019bf7a818e7a242b4e2b2ad76 0
More files

Registry Details

Pony Botnet creates the following registry entry or registry entries:
Regexp file mask
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\netfile.vbe

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.