This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
It is delivered by the RiG exploit kit alongside a secondary package containing a full Python installation. Once initialised, the Python installer will run before removing itself from the system. PBot will then be installed disguised as a seemingly legitimate program.
Run key entries are added to the registry to maintain persistence.
Pbot is able to inject scripts into all websites visited using a number of browsers. Attackers can then control the content displayed to users, showing advertisements as well as other malicious content. A large list of primarily Russian sites to avoid are included in PBot's code. It can also replace legitimate certificates on HTTPS sites and capture information transferred between a user and the browser.
Remediation advice
To prevent and detect infection, ensure that:Remediation steps
| Type | Step |
|---|---|
|
Last edited: 17 February 2020 12:52 pm