Knowledge

Brontok

Source 📝

110:") -- 2.Stop Free Sex, Abortion, & Prostitution (Go To HELL) 3.Stop (sea and river pollution), forest burning, & wild hunting. 4.SAY NO TO DRUGS!!! - THE END IS NEAR - 5. Do you think you're smart? Inspired by: (Spizaetus Cirrhatus) that is almost extinct [By: HVM31 JowoBot #VM Communityunity -- 178:
settings. It removes the option of "Folder Options" in the Tools menu so that the hidden files, where it is concealed, are not easily accessible to the user. It also turns off Windows firewall. In some variants, when a window is found containing certain strings (such as "application data") in the
179:
window title, the computer reboots. User frustration also occurs when an address typed into Windows Explorer is blanked out before completion. Using its own mailing engine, it sends itself to email addresses it finds on the computer, even faking the own user's email address as the sender.
77:
Other names for this worm include: W32/Rontokbro.gen@MM, W32.Rontokbro@mm, BackDoor.Generic.1138, W32/Korbo-B, Worm/Brontok.a, Win32.Brontok.A@mm, Worm.Mytob.GH, W32/Brontok.C.worm, Win32/Brontok.E, Win32/Brontok.X@mm, and W32.Rontokbro.D@mm.
289: 341: 198:, "Pictures") folder. It creates .exe files in folders usually named as the folder itself (..\documents\documents.exe) this also includes all mapped network drives. 264: 285: 241: 315: 69:
The most affected countries were Russia, Vietnam and Brazil, followed by Spain, Mexico, Iran, Azerbaijan, India and the Philippines.
106:-- stop the collapse in this country—1. Try the Hoodlums, the Smugglers, the Bribers, the gamblers, & drugs Port (Send to " 337: 159:
When Brontok is first run, it copies itself to the user's application data directory. It then sets itself to start up with
374: 379: 96:, a bird species native to South & Southeast Asia. It arrives as an attachment of e-mail named kangen.exe ( 183: 103:
The virus/email itself contains a message in Indonesian (and some English). When translated, this reads:
91: 311: 369: 256: 186:
and prevents the user from downloading files. It also pop ups the default Web browser and loads a
139:. A number of other websites with .com TLD were also attacked, prompting popular Indonesian forum 207: 237: 160: 27: 175: 167: 147:
TLD until May 2012. Brontok inspired the creation of a more persistent trojan/worm such as
363: 195: 107: 23: 148: 171: 210:
although there are various standalone tools available by antivirus providers.
136: 124: 114: 117: 87: 187: 132: 140: 128: 31: 191: 144: 90:. It was first discovered in 2005. The name refers to 182:The computer also restarts when trying to open the 165:HKLM\Software\Microsoft\Windows\CurrentVersion\Run 236:(in Indonesian), Penerbit Mediakom, p. 10, 194:) which is located in the "My Pictures" (or on 170:key. It disables the Windows Registry Editor ( 8: 227: 225: 223: 151:which attacked internet cafes in July 2009. 234:Mengembalikan Data yang Hilang Akibat Virus 219: 100:itself means "to miss someone/thing"). 163:, by creating a registry entry in the 7: 344:from the original on 9 February 2013 318:from the original on 19 April 2013 14: 292:from the original on 5 March 2014 267:from the original on 2022-05-21 206:Brontok can be removed by most 1: 257:"Kaspersky Threats — Brontok" 123:The worm also carried out a 30:. It is able to disperse by 396: 286:"Worm:Win32/Brontok.AR@mm" 135:, possibly in an act of 127:attack on two websites: 184:Windows Command Prompt 86:Brontok originated in 261:threats.kaspersky.com 375:Hacking in the 2000s 312:"Win32.Brontok.A@mm" 34:. Variants include: 380:Cybercrime in India 232:Yuliansyah (2010), 113:It also contains a 208:antivirus software 243:978-979-8771-03-3 28:Microsoft Windows 387: 354: 353: 351: 349: 334: 328: 327: 325: 323: 308: 302: 301: 299: 297: 282: 276: 275: 273: 272: 253: 247: 246: 229: 176:Windows Explorer 166: 395: 394: 390: 389: 388: 386: 385: 384: 360: 359: 358: 357: 347: 345: 338:"Win32/Brontok" 336: 335: 331: 321: 319: 314:. Bitdefender. 310: 309: 305: 295: 293: 284: 283: 279: 270: 268: 255: 254: 250: 244: 231: 230: 221: 216: 204: 174:) and modifies 164: 157: 111: 84: 75: 17: 12: 11: 5: 393: 391: 383: 382: 377: 372: 362: 361: 356: 355: 329: 303: 277: 248: 242: 218: 217: 215: 212: 203: 200: 156: 153: 105: 83: 80: 74: 71: 67: 66: 63: 60: 57: 54: 51: 48: 45: 42: 39: 16:Computer virus 15: 13: 10: 9: 6: 4: 3: 2: 392: 381: 378: 376: 373: 371: 368: 367: 365: 343: 340:. Microsoft. 339: 333: 330: 317: 313: 307: 304: 291: 288:. Microsoft. 287: 281: 278: 266: 262: 258: 252: 249: 245: 239: 235: 228: 226: 224: 220: 213: 211: 209: 201: 199: 197: 196:Windows Vista 193: 189: 185: 180: 177: 173: 169: 162: 154: 152: 150: 146: 143:to switch to 142: 138: 134: 130: 129:Israel.gov.il 126: 121: 119: 116: 109: 108:Nusakambangan 104: 101: 99: 95: 94: 93:elang brontok 89: 81: 79: 72: 70: 64: 61: 58: 55: 52: 49: 46: 43: 40: 37: 36: 35: 33: 29: 25: 24:computer worm 21: 346:. Retrieved 332: 320:. Retrieved 306: 294:. Retrieved 280: 269:. Retrieved 260: 251: 233: 205: 181: 158: 149:Daprosy Worm 122: 112: 102: 97: 92: 85: 76: 68: 19: 18: 370:Email worms 348:14 February 322:14 February 296:14 February 172:regedit.exe 133:playboy.com 73:Other names 26:running on 364:Categories 271:2022-09-02 214:References 137:hacktivism 125:ping flood 115:JavaScript 65:Brontok.BH 88:Indonesia 62:Brontok.U 59:Brontok.Q 56:Brontok.K 53:Brontok.I 50:Brontok.H 47:Brontok.G 44:Brontok.F 41:Brontok.D 38:Brontok.A 342:Archived 316:Archived 290:Archived 265:Archived 188:web page 168:registry 155:Symptoms 202:Removal 161:Windows 20:Brontok 240:  141:Kaskus 118:pop-up 98:kangen 82:Origin 32:e-mail 22:is a 350:2013 324:2013 298:2013 238:ISBN 192:HTML 131:and 145:.us 366:: 263:. 259:. 222:^ 120:. 352:. 326:. 300:. 274:. 190:(

Index

computer worm
Microsoft Windows
e-mail
Indonesia
elang brontok
Nusakambangan
JavaScript
pop-up
ping flood
Israel.gov.il
playboy.com
hacktivism
Kaskus
.us
Daprosy Worm
Windows
registry
regedit.exe
Windows Explorer
Windows Command Prompt
web page
HTML
Windows Vista
antivirus software



ISBN
978-979-8771-03-3
"Kaspersky Threats — Brontok"

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.