Pony botnet

Pony botnet Description


The Pony botnet is a loose collection of PCs compromised by affiliated backdoor Trojans and spyware, which have been found to be so effective that, in less than a week, they already managed to steal the account login data of over half a million separate victims. The Pony botnet attacks are fairly indiscriminate about which applications they harvest their login information from, and will target most brands of Web browsers and e-mail clients – as well as including some generalized data-recording functions that aren’t tied to any specific programs. To keep your own information from falling victim to theft by the Pony botnet, SpywareRemove.com malware researchers encourage all appropriate anti-malware strategies, including blocking, disabling and removing Pony botnet Trojans from your PC with suitable anti-malware software.

Why the Pony Botnet Isn’t Exactly Your Little Pony


Less of a vehicle of transportation for you than the Pony botnet is a transferal mechanism through which criminals can steal your private information, the Pony botnet only has had a limited number of Command & Control servers confirmed thus far, but already is showing huge numbers of successful attacks – all tracked with professionally-managed statistics. Currently, the Pony botnet’s C&C interface is displayed in Russian, but the Pony botnet’s attacks are far too widespread (hundreds of thousands, at current estimates) to be confined to that region alone, and most likely are affecting the majority of first-world countries like the US, Europe, Canada and Australia.

On the victim’s end, the primary component of the Pony botnet is a spyware program that includes keylogging functionality.
DOWNLOAD NOW

» Learn more about SpyHunter's Spyware Detection Tool
and steps to uninstall SpyHunter.

Keyloggers can record your keyboard input and transfer the data – usually in the format of a text log – to a central server, where criminals peruse it for passwords, account numbers and other data worth plundering. Pony botnet spyware also includes many functions for targeting a broad range of popular programs, and SpywareRemove.com malware experts have put together the following list of examples:
  • FTP clients like FFFTP or TurboFTP.
  • Web browsers like Google Chrome, Internet Explorer, Firefox or Opera.
  • E-mail clients like Incredimail, Outlook and Windows Live Mail.
  • Specific websites, such as Facebook, Twitter, Yahoo and Google.

Although the Pony botnet spyware can steal other types of information, the criminals behind the Pony botnet campaign appear to be especially interested in compromising any online accounts by stealing passwords, e-mail addresses, user login names and similar data. The infection vector for the Pony botnet has yet to be identified – a fact that worries SpywareRemove.com malware experts and should worry you, as well, considering the hundreds of thousands of victims the Pony botnet already has tallied in a very short time period.

Getting a Fast Ticket Off the Pony Botnet Ride


The Pony botnet campaign is serviced by multiple C&C servers and does appear to be undergoing ongoing development – as indicated by its current version number of 1.9. As an active and non-negligible assault on your privacy and the safety of your PC, the Pony botnet should be considered a high-level PC threat, and SpywareRemove.com malware experts recommend the use of appropriate anti-malware tools for detecting or deleting Pony botnet spyware.

Trojans related to the Pony botnet may be identified by various aliases, such as a variant of PWS:Win32/Fareit – a family of password-stealing spyware that also can use your computer’s resources to perform DDoS attacks. DDoS attacks, by creating floods of artificial traffic, force targeted websites to crash, and also may cause some performance issues on the end of the user of the infected PC.

Pony botnet Automatic Detection Tool (Recommended)


Is your PC infected with Pony botnet? To safely & quickly detect Pony botnet we highly recommend you run the malware scanner listed below.



Posted: July 9, 2013 | By
Share:
Rate this article:
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...
Threat Metric
Threat Level: 7/10
Detection Count: 22

Leave a Reply

What is 12 + 15 ?
Please leave these two fields as-is:
IMPORTANT! To be able to proceed, you need to solve the following simple math (so we know that you are a human) :-)