‘Funky’ Mumba botnet hits 55,000 systems
The Avalanche Group's Mumba botnet has stolen more than 60GB of personal data and infected 55,000 computers.


A botnet has infected 55,000 computers and illicitly acquired over 60GB of personal data along the way, a security company has warned.
The Mumba botnet has stolen information including details from social networking sites, banking account data and email communications, according to AVG Technologies.
US users have been hardest hit, with 33 per cent of all Mumba-infected PCs situated in the country, compared to six per cent in the UK.
"The Mumba botnet, so called because of some funky attributes our researchers found on the server, was created by one of the most sophisticated groups of cyber criminals on the internet known as the Avalanche Group," explained Roger Thompson, chief research officer at AVG.
"This group has perfected a mass-production system for deploying phishing sites and data stealing malware," he added in a blog post.
Mumba uses the most up-to-date version of the famous Zeus piece of malware. Just last month, Zeus popped up in an attack that cloned the Verified by Visa and MasterCard SecureCode protection features to trick users into entering personal data.
"The unique infrastructure of the Mumba botnet means that going after the servers hosting the stolen data is now much more difficult than before," added Yuval Ben-Itzhak, senior vice president at AVG.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard Published
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd Published
-
Seized database helps Europol snare botnet customers in ‘Operation Endgame’ follow-up sting
News Europol has detained several people believed to be involved in a botnet operation as part of a follow-up to a major takedown last year.
By Emma Woollacott Published
-
Horabot campaign targeted businesses for more than two years before finally being discovered
News The newly-discovered Horabot botnet has attacked companies in the accounting, investment, and construction sectors in particular
By Ross Kelly Published
-
Brand-new Emotet campaign socially engineers its way from detection
News This latest resurgence follows a three-month hiatus and tricks users into re-enabling dangerous VBA macros
By Ross Kelly Published
-
Microsoft says “it’s just too difficult” to effectively disrupt ransomware
News The company details its new approach to combatting cyber crime as the underground industry drains $6 trillion from the global economy
By Connor Jones Published
-
Beating the bad bots: Six ways to identify and block spam traffic
In-depth Not all traffic is good. Learn how to prevent bad bots from overrunning your website
By Sead Fadilpašić Published
-
Ukraine's vigilante IT army now has a DDoS bot to automate attacks against Russia
News The 270,000-strong IT Army of Ukraine will now combine supporters' cloud infrastructure to strengthen the daily attacks against their invaders
By Connor Jones Published
-
Microsoft's secure VBA macro rules already being bypassed by hackers
News Recent analysis of Emotet activity has revealed a shift away from malicious Office documents to drop malware
By Connor Jones Published
-
Emotet infrastructure has almost doubled since resurgence was confirmed
News Researchers confirm the infrastructure has also been upgraded for a "better secured", more resilient operation
By Connor Jones Published