{"id":36091,"date":"2014-06-23T12:07:33","date_gmt":"2014-06-23T19:07:33","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=36091"},"modified":"2025-06-02T00:39:11","modified_gmt":"2025-06-02T07:39:11","slug":"glance-neutrino-botnet","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/","title":{"rendered":"A Glance Into the Neutrino Botnet"},"content":{"rendered":"<p style=\"text-align: justify;\">Lately, we have seen a number of communications through our automated framework from the Neutrino botnet. While analyzing this botnet, we found that it has a number of anti-debugging, anti-virtual machine, and sandbox-detection techniques that we have seen before. The botnet looks to be at an early stage, based on factors such as no obfuscation\/packer used in the botnet binary, a couple of hardcoded strings, and old anti-analysis techniques. The most interesting part of the botnet is the deliberate \u201c404 Not Found\u201d response from its control server that contains base64-encoded malicious commands. The botnet supports malicious commands such as distributed denial-of-service attacks, keylogger, download and execute, etc. You can learn more about the Neutrino botnet <a href=\"http:\/\/malware.dontneedcoffee.com\/2014\/06\/neutrino-bot-aka-kasidet.html\">at this site hosted by Kafeine.<\/a><\/p>\n<p style=\"text-align: justify;\">The botnet binary we analyzed is written in Visual C++ and uses no packer or obfuscation techniques. The binary immediately calls a function that will check if the binary is being debugged or run under any virtual machine. If the malware finds any of these, it terminates. Here are the checks implemented in the binary:<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/anti-vm-debug-sand.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36093\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/anti-vm-debug-sand.png\" alt=\"anti-vm-debug-sand\" width=\"947\" height=\"900\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/anti-vm-debug-sand.png 947w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/anti-vm-debug-sand-300x285.png 300w\" sizes=\"auto, (max-width: 947px) 100vw, 947px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">Once bypassed, the binary creates a mutex under the name n3nmtx, which is hardcoded in the binary. Then the malware performs a series of operations by calling different functions as below:<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_diff_fucntions.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36094\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_diff_fucntions.png\" alt=\"neturino_diff_fucntions\" width=\"729\" height=\"563\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_diff_fucntions.png 729w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_diff_fucntions-300x231.png 300w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">The binary gathers system information as we see above, retrieves hardcoded control server URLs, and then checks if the control server responds by sending a GET request, shown below:<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_ping_pong.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36096\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_ping_pong.png\" alt=\"neturino_ping_pong\" width=\"695\" height=\"282\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_ping_pong.png 695w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_ping_pong-300x121.png 300w\" sizes=\"auto, (max-width: 695px) 100vw, 695px\" \/><\/a><\/p>\n<h2>The Content of the Malware<\/h2>\n<p style=\"text-align: justify;\">As shown above, a few things are hardcoded in the malware, and we can easily look into the strings of this binary. The binary creates a directory under %APPDATA% and copies itself into that directory with different system filenames. It next adds a registry entry under Software\\Microsoft\\Windows\\CurrentVersion\\Run. The collected system information is then sent to its control server, as we see below:<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_cc_response.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36095\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_cc_response.png\" alt=\"neturino_c&amp;c_response\" width=\"750\" height=\"356\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_cc_response.png 750w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_cc_response-300x142.png 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">The \u201c404 Not Found\u201d response is sent by the server to hide another malicious command, which is hidden inside the comment section of the HTML response. The hidden command, which starts with NCMD, is base64 encoded. When we convert the base64 response, it turns into:<\/p>\n<p style=\"text-align: justify;\">\u201c1400833546611328#keylogger Western#1399621409275851#rate 1#\u201d<\/p>\n<p style=\"text-align: justify;\">The command tells the botnet binary to start a keylogger on the infected system. The keylogger functions retrieve clipboard data and write it to the file _clipbrd.txt, under %APPDATA% in the directory LOGS, which is created by the binary in the following format:<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_clipboard_file.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36097\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_clipboard_file.png\" alt=\"neturino_clipboard_file\" width=\"387\" height=\"108\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_clipboard_file.png 387w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_clipboard_file-300x83.png 300w\" sizes=\"auto, (max-width: 387px) 100vw, 387px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">The botnet then informs its control server about the task it executed in the POST request shown below:<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_task_send.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36098\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_task_send.png\" alt=\"neturino_task_send\" width=\"713\" height=\"276\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_task_send.png 713w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_task_send-300x116.png 300w\" sizes=\"auto, (max-width: 713px) 100vw, 713px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">The control server sends additional commands to the infected system and executes them. The string from the binary contains all the supported commands by this botnet. Here is the list:<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_bot_commands.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36099\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_bot_commands.png\" alt=\"neturino_bot_commands\" width=\"637\" height=\"707\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_bot_commands.png 637w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/neturino_bot_commands-270x300.png 270w\" sizes=\"auto, (max-width: 637px) 100vw, 637px\" \/><\/a><\/p>\n<h2>Finally&#8230;<\/h2>\n<p style=\"text-align: justify;\">The hardcoded strings and plain communication over the network make this botnet easily detectable. McAfee customers are already protected from this threat.<\/p>\n<p style=\"text-align: justify;\">\n","protected":false},"excerpt":{"rendered":"<p>Lately, we have seen a number of communications through our automated framework from the Neutrino botnet. While analyzing this botnet,&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[49,1814,180],"coauthors":[3973],"class_list":["post-36091","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-botnet","tag-computer-security","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Glance Into the Neutrino Botnet<\/title>\n<meta name=\"description\" content=\"A Glance Into the Neutrino Botnet\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Glance Into the Neutrino Botnet\" \/>\n<meta property=\"og:description\" content=\"A Glance Into the Neutrino Botnet\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-23T19:07:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T07:39:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/anti-vm-debug-sand.png\" \/>\n\t<meta property=\"og:image:width\" content=\"947\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"A Glance Into the Neutrino Botnet\",\"datePublished\":\"2014-06-23T19:07:33+00:00\",\"dateModified\":\"2025-06-02T07:39:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/\"},\"wordCount\":477,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/anti-vm-debug-sand.png\",\"keywords\":[\"botnet\",\"computer security\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/\",\"name\":\"A Glance Into the Neutrino Botnet\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/anti-vm-debug-sand.png\",\"datePublished\":\"2014-06-23T19:07:33+00:00\",\"dateModified\":\"2025-06-02T07:39:11+00:00\",\"description\":\"A Glance Into the Neutrino Botnet\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/anti-vm-debug-sand.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/anti-vm-debug-sand.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"A Glance Into the Neutrino Botnet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Glance Into the Neutrino Botnet","description":"A Glance Into the Neutrino Botnet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"A Glance Into the Neutrino Botnet","og_description":"A Glance Into the Neutrino Botnet","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2014-06-23T19:07:33+00:00","article_modified_time":"2025-06-02T07:39:11+00:00","og_image":[{"width":947,"height":900,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/anti-vm-debug-sand.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"A Glance Into the Neutrino Botnet","datePublished":"2014-06-23T19:07:33+00:00","dateModified":"2025-06-02T07:39:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/"},"wordCount":477,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/anti-vm-debug-sand.png","keywords":["botnet","computer security","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/","name":"A Glance Into the Neutrino Botnet","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/anti-vm-debug-sand.png","datePublished":"2014-06-23T19:07:33+00:00","dateModified":"2025-06-02T07:39:11+00:00","description":"A Glance Into the Neutrino Botnet","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/anti-vm-debug-sand.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/anti-vm-debug-sand.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/glance-neutrino-botnet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"A Glance Into the Neutrino Botnet"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/36091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=36091"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/36091\/revisions"}],"predecessor-version":[{"id":214785,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/36091\/revisions\/214785"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=36091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=36091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=36091"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=36091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}