This content was deleted by the author. You can see it from Blockchain History logs.

Bots learning taking screenshot and new tricks

Old botnet learning new tricks, like taking desktop screenshots
The group behind Necurs, one of the most venerable malware spamming operations, has added functions to its toolkit to gain new insight into its victims, according to a report released Tuesday.
B3E6FA96-3A5E-408E-B1C1-C41E06C8E371.jpeg

Necurs is a botnet, a vast network of hacked computers used in this case to bulk email malware to new victims. The malware includes TrickBot, which is designed to steal banking credentials, and Locky, a form of ransomware.

Researchers at Symantec announced Tuesday that in addition to its recent updates to Locky and TrickBot, the Necurs group added some curious updates to the program used to download Locky and TrickBot onto new systems.

Downloaders usually try to fly under the radar and operate as quickly and covertly as possible. The new updates add a screenshot function and error reporting to the mix.
BFA08AB0-A171-4355-B7EE-50C9CF7D7E61.gif
"When consider the screen grab functionality together with the new error-reporting capability, it suggests that the Necurs attackers are actively trying to gather operational intelligence (OPINTEL) about the performance of their campaigns," Symantec wrote in a blog post.

"After all, can’t count on the victims to report back errors and issues!" Symantec added later.