New “operational” samples of the NukeBot banking trojan have emerged months after its original creator published its source code. NukeBot’s source code leak, which occurred in late March 2017, apparently attracted the attention of malware developers seeking to push out their own threats. Kaspersky Lab’s Sergey Yunakovsky spotted some of those new samples in the wild. A few are “active,” but most of them only in a limited form.
View Full Story
ORIGINAL SOURCE: Graham Cluley