Bondat Worm
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
Bondat is distributed as a file on removable drives. .lnk files are automatically executed when an infected drive is connected to a system. These will search for files with a specific format and create shortcuts pointing at the Bondat launcher with the same name before hiding the original. When a user opens these shortcuts Bondat is installed and writes itself, along with new .lnk files, to any removable drives it can reach.
Once installed, Bondat will use headless browser windows to connect to a Coinhive-based mining page. It will also attempt to brute-force specific WordPress sites.
Remediation advice
To prevent and detect an infection, ensure that:Remediation steps
| Type | Step |
|---|---|
|
Last edited: 17 February 2020 12:39 pm