Research by: Alexey Bukhteyev Introduction We recently wrote about the massive “sextortion” spam campaign carried out by the Phorpiex botnet. However, this is only a small part of this botnet’s malicious activity. Capable of acting like both a computer worm and a file virus, Phorpiex is spread through exploit kits and with the help of... Click to Read More
The post Phorpiex Breakdown appeared first on Check Point Research.
Article Link: http://research.checkpoint.com/phorpiex-breakdown/