110:") -- 2.Stop Free Sex, Abortion, & Prostitution (Go To HELL) 3.Stop (sea and river pollution), forest burning, & wild hunting. 4.SAY NO TO DRUGS!!! - THE END IS NEAR - 5. Do you think you're smart? Inspired by: (Spizaetus Cirrhatus) that is almost extinct [By: HVM31 JowoBot #VM Communityunity --
178:
settings. It removes the option of "Folder
Options" in the Tools menu so that the hidden files, where it is concealed, are not easily accessible to the user. It also turns off Windows firewall. In some variants, when a window is found containing certain strings (such as "application data") in the
179:
window title, the computer reboots. User frustration also occurs when an address typed into
Windows Explorer is blanked out before completion. Using its own mailing engine, it sends itself to email addresses it finds on the computer, even faking the own user's email address as the sender.
77:
Other names for this worm include: W32/Rontokbro.gen@MM, W32.Rontokbro@mm, BackDoor.Generic.1138, W32/Korbo-B, Worm/Brontok.a, Win32.Brontok.A@mm, Worm.Mytob.GH, W32/Brontok.C.worm, Win32/Brontok.E, Win32/Brontok.X@mm, and W32.Rontokbro.D@mm.
289:
341:
198:, "Pictures") folder. It creates .exe files in folders usually named as the folder itself (..\documents\documents.exe) this also includes all mapped network drives.
264:
285:
241:
315:
69:
The most affected countries were Russia, Vietnam and Brazil, followed by Spain, Mexico, Iran, Azerbaijan, India and the
Philippines.
106:-- stop the collapse in this country—1. Try the Hoodlums, the Smugglers, the Bribers, the gamblers, & drugs Port (Send to "
337:
159:
When
Brontok is first run, it copies itself to the user's application data directory. It then sets itself to start up with
374:
379:
96:, a bird species native to South & Southeast Asia. It arrives as an attachment of e-mail named kangen.exe (
183:
103:
The virus/email itself contains a message in
Indonesian (and some English). When translated, this reads:
91:
311:
369:
256:
186:
and prevents the user from downloading files. It also pop ups the default Web browser and loads a
139:. A number of other websites with .com TLD were also attacked, prompting popular Indonesian forum
207:
237:
160:
27:
175:
167:
147:
TLD until May 2012. Brontok inspired the creation of a more persistent trojan/worm such as
363:
195:
107:
23:
148:
171:
210:
although there are various standalone tools available by antivirus providers.
136:
124:
114:
117:
87:
187:
132:
140:
128:
31:
191:
144:
90:. It was first discovered in 2005. The name refers to
182:The computer also restarts when trying to open the
165:HKLM\Software\Microsoft\Windows\CurrentVersion\Run
236:(in Indonesian), Penerbit Mediakom, p. 10,
194:) which is located in the "My Pictures" (or on
170:key. It disables the Windows Registry Editor (
8:
227:
225:
223:
151:which attacked internet cafes in July 2009.
234:Mengembalikan Data yang Hilang Akibat Virus
219:
100:itself means "to miss someone/thing").
163:, by creating a registry entry in the
7:
344:from the original on 9 February 2013
318:from the original on 19 April 2013
14:
292:from the original on 5 March 2014
267:from the original on 2022-05-21
206:Brontok can be removed by most
1:
257:"Kaspersky Threats — Brontok"
123:The worm also carried out a
30:. It is able to disperse by
396:
286:"Worm:Win32/Brontok.AR@mm"
135:, possibly in an act of
127:attack on two websites:
184:Windows Command Prompt
86:Brontok originated in
261:threats.kaspersky.com
375:Hacking in the 2000s
312:"Win32.Brontok.A@mm"
34:. Variants include:
380:Cybercrime in India
232:Yuliansyah (2010),
113:It also contains a
208:antivirus software
243:978-979-8771-03-3
28:Microsoft Windows
387:
354:
353:
351:
349:
334:
328:
327:
325:
323:
308:
302:
301:
299:
297:
282:
276:
275:
273:
272:
253:
247:
246:
229:
176:Windows Explorer
166:
395:
394:
390:
389:
388:
386:
385:
384:
360:
359:
358:
357:
347:
345:
338:"Win32/Brontok"
336:
335:
331:
321:
319:
314:. Bitdefender.
310:
309:
305:
295:
293:
284:
283:
279:
270:
268:
255:
254:
250:
244:
231:
230:
221:
216:
204:
174:) and modifies
164:
157:
111:
84:
75:
17:
12:
11:
5:
393:
391:
383:
382:
377:
372:
362:
361:
356:
355:
329:
303:
277:
248:
242:
218:
217:
215:
212:
203:
200:
156:
153:
105:
83:
80:
74:
71:
67:
66:
63:
60:
57:
54:
51:
48:
45:
42:
39:
16:Computer virus
15:
13:
10:
9:
6:
4:
3:
2:
392:
381:
378:
376:
373:
371:
368:
367:
365:
343:
340:. Microsoft.
339:
333:
330:
317:
313:
307:
304:
291:
288:. Microsoft.
287:
281:
278:
266:
262:
258:
252:
249:
245:
239:
235:
228:
226:
224:
220:
213:
211:
209:
201:
199:
197:
196:Windows Vista
193:
189:
185:
180:
177:
173:
169:
162:
154:
152:
150:
146:
143:to switch to
142:
138:
134:
130:
129:Israel.gov.il
126:
121:
119:
116:
109:
108:Nusakambangan
104:
101:
99:
95:
94:
93:elang brontok
89:
81:
79:
72:
70:
64:
61:
58:
55:
52:
49:
46:
43:
40:
37:
36:
35:
33:
29:
25:
24:computer worm
21:
346:. Retrieved
332:
320:. Retrieved
306:
294:. Retrieved
280:
269:. Retrieved
260:
251:
233:
205:
181:
158:
149:Daprosy Worm
122:
112:
102:
97:
92:
85:
76:
68:
19:
18:
370:Email worms
348:14 February
322:14 February
296:14 February
172:regedit.exe
133:playboy.com
73:Other names
26:running on
364:Categories
271:2022-09-02
214:References
137:hacktivism
125:ping flood
115:JavaScript
65:Brontok.BH
88:Indonesia
62:Brontok.U
59:Brontok.Q
56:Brontok.K
53:Brontok.I
50:Brontok.H
47:Brontok.G
44:Brontok.F
41:Brontok.D
38:Brontok.A
342:Archived
316:Archived
290:Archived
265:Archived
188:web page
168:registry
155:Symptoms
202:Removal
161:Windows
20:Brontok
240:
141:Kaskus
118:pop-up
98:kangen
82:Origin
32:e-mail
22:is a
350:2013
324:2013
298:2013
238:ISBN
192:HTML
131:and
145:.us
366::
263:.
259:.
222:^
120:.
352:.
326:.
300:.
274:.
190:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.