To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

From Wikipedia, the free encyclopedia

Brambul
Common nameBrambul
Technical name
TypeComputer worm
Author(s)Lazarus
Operating system(s) affectedWindows XP
Written inKorean

Brambul is an SMB protocol computer worm that decrypts[clarification needed] and automatically moves from one computer to its second computer.

It is responsible for the dropping of the Joanap botnet.

History

Brambul was first discovered in 2009 and has not had a disclosure prior to its notoriety. It was observed by cybersecurity firms and was not extensive subject.[4]

Sony hack (Late 2014)

Brambul was among the malware to be identified during the Sony Pictures hack.

Investigation (Early 2019)

Brambul as well as Joanap botnet have both been shut down via a court order.

Cycle

The computer worm has the ability to automatically scan IP addresses and decrypt passwords including, but not limited to the following.[1]

Password Description
password The word password
!@#$% 1-5 typed with the shift key
!@#$%^&*() all ten number keys typed with the shift key
~!@#$%^&*()_+ the entire top row of keys typed with the shift key

System drive share

Brambul will share information of the system to the cyberattacker. Information shared includes the IP address, hostname and the username and password.[5]

References

  1. ^ a b "W32.Brambul". Symantec. Archived from the original on May 31, 2018.
  2. ^ "Win32/Brambul threat description - Microsoft Security Intelligence". www.microsoft.com.
  3. ^ "Trojan:Win32/Brambul.A threat description - Microsoft Security Intelligence". www.microsoft.com.
  4. ^ "Hidden Cobra Strikes Again with Custom RAT, SMB Malware". threatpost.com.
  5. ^ at 01:58, Simon Sharwood 30 May 2018. "FBI fingers North Korea for two malware strains". www.theregister.co.uk.{{cite web}}: CS1 maint: numeric names: authors list (link)

External links

This page was last edited on 29 April 2024, at 22:38
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.