Phorpiex botnet

The Phorpiex Botnet, initially a worm spreading through removable and network drives, gained notoriety for using the IRC protocol, known as Trik. This malicious network is infamous for its wide range of cyber activities, including massive spam campaigns, crypto-jacking, ransomware distribution, and cryptocurrency theft.

After a period of inactivity in its command and control servers, Phorpiex resurfaced with a new bot named "Twizt," allowing it to operate independently in a peer-to-peer mode. It evades detection by checking for virtual or debugging environments, terminating itself if found. Without such environments, it ensures persistence on compromised systems and infects drives, while also connecting to malicious servers to download more malware and disabling security features.

In 2021, Phorpiex was detected in 96 countries, notably using cryptocurrency theft methods. Protecting your organization from this threat is crucial. Implementing a Security Information and Event Management (SIEM) solution can provide real-time threat prevention against known and emerging threats, bolstering network and endpoint security to defend against the Phorpiex Botnet and similar dangers. Watch the video to learn more—three minutes is all it takes!

  • &nsbp;

    Conti ransomeware

    Conti is a ransomware-as-a-service affiliate program associated with...

    3.00

     
  • &nsbp;

    Apache Log4j vulnerability

    Logging is a fundamental feature of software. A flaw in Log4j...

    3.00

     
  • &nsbp;

    US government probes...

    On April 29, 2022, the United States government...

    3.00

     
  • &nsbp;

    Qakbot malware

    First discovered in 2007, Qakbot is widespread malware used for stealing information...

    3.00

     
  • &nsbp;

    Emotet malware

    Originally developed as a banking trojan in 2014, Emotet malware was...

    3.00

     
  • &nsbp;

    Cobalt Strike

    Created in 2012 by Raphael Mudge, Cobalt Strike is a remote...

    3.00

     
  • &nsbp;

    Mimikatz

    Mimikatz is an open source application that allows users to view and save...

    3.00

     
  • &nsbp;

    REvil Ransomware

    Belonging to the Cryptomix ransomware family, Clop ransomware...

    3.00

     
  • &nsbp;

    TrickBot

    Originally designed by a group of sophisticated cybercriminals as a banking...

    3.00

     
  • &nsbp;

    Colonial Pipeline attack

    Colonial Pipeline, a jet fuel and gasoline provider for the eastern United...

    3.00

     
  • &nsbp;

    Clop ransomware

    A California-based information security and compliance firm, Qualys,...

    3.00

     
  • &nsbp;

    Mirai malware

    Mirai malware infects devices that run on the ARC processor, turning...

    3.00

     
  • &nsbp;

    IcedID Malware

    IcedID, aka BokBot, is a banking trojan-type malware that can be used...

    3.00

     
  • &nsbp;

    SocGholish

    SocGholish is an initial access threat that uses drive-by-downloads that...

    3.00

     
  • &nsbp;

    Agent Tesla

    First discovered in 2014, Agent Tesla is an advanced Remote Access...

    3.00

     
  • &nsbp;

    Shlayer Malware

    First discovered in 2018, Shlayer malware has become one of the most...

    3.00

     
  • &nsbp;

    Gameover Zeus

    Identified in September 2011, GameOver Zeus is a peer-to-peer (P2P) variant...

    3.00

     
  • &nsbp;

    LokiBot

    First discovered in 2016, LokiBot is infostealing malware that...

    3.00

     
  • &nsbp;

    NanoCore

    Sold in underground forums, the NanoCore remote access Trojan...

    3.00

     
  • &nsbp;

    Man-in-the-middle attacks

    Man-in-the-middle (MitM) attacks take place...

    3.00

     
  • &nsbp;

    GandCrab ransomware

    GandCrab ransomware encrypts victims files...

    3.00

     
  • &nsbp;

    FormBook malware

    FormBook is an infostealer malware that steals...

    3.00

     
  • &nsbp;

    Shamoon virus

    Shamoon is a dangerous malware program used in...

    3.00

     
  • &nsbp;

    Lapsus ransomware

    Lapsus is a hacking group that gained noto...

    3.00

     
  • &nsbp;

    njRAT trojan

    The njRAT, also known as Bladabindi, is...

    3.00

     
  • &nsbp;

    HawkEye keylogger

    HawkEye keylogger is a formidable...

    3.00

     
  • &nsbp;

    Teslacrypt

    TeslaCrypt is a ransomware variant...

    3.00

     

Get the latest content delivered
right to your inbox!

Thank you for subscribing.

You will receive regular updates on the latest news on cybersecurity.

  • Please enter a business email id
  • US
  • By clicking on Keep me Updated you agree to processing of personal data according to the Privacy Policy.

© 2025 Zoho Corporation Pvt. Ltd. All rights reserved.

Back to Top