botnet

  1. News

    TA17-318B: HIDDEN COBRA – North Korean Trojan: Volgmer

    Original release date: November 14, 2017 Systems Affected Network systems Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). Working with U.S. government partners, DHS...
  2. News

    TA17-164A: HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure

    Original release date: June 13, 2017 | Last revised: July 07, 2017 Systems Affected Networked Systems Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert...
  3. News

    TA16-336A: Avalanche (crimeware-as-a-service infrastructure)

    Original release date: December 01, 2016 | Last revised: December 14, 2016 Systems Affected Microsoft Windows Overview “Avalanche” refers to a large global network hosting infrastructure used by cyber criminals to conduct phishing and malware distribution campaigns and money mule schemes...
  4. News

    TA17-164A: HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure

    Original release date: June 13, 2017 Systems Affected Networked Systems Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert provides technical details on the...
  5. danny2411

    Am I safe from the botnet attacks?

    Hi, I have an account for bitcoins. I use the account for online games. I am worried about its security after watching this video blog. Link Removed They say that bitcoin accounts are prone to attacks from botnets. And they say users of windows servers are also prone to such attacks. What...
  6. News

    TA16-336A: Avalanche (crimeware-as-a-service infrastructure)

    Original release date: December 01, 2016 Systems Affected Microsoft Windows Overview “Avalanche” refers to a large global network hosting infrastructure used by cyber criminals to conduct phishing and malware distribution campaigns and money mule schemes. The United States Department of...
  7. News

    TA16-288A: Heightened DDoS Threat Posed by Mirai and Other Botnets

    Original release date: October 14, 2016 Systems Affected Internet of Things (IoT)—an emerging network of devices (e.g., printers, routers, video cameras, smart TVs) that connect to one another via the Internet, often automatically sending and receiving data Overview Recently, IoT devices...
  8. News

    TA15-337A: Dorkbot

    Original release date: December 03, 2015 Systems Affected Microsoft Windows Overview Dorkbot is a botnet used to steal online payment, participate in distributed denial-of-service (DDoS) attacks, and deliver other types of malware to victims’ computers. According to Microsoft, the family of...
  9. News

    TA14-295A: Crypto Ransomware

    Original release date: October 22, 2014 Systems Affected Microsoft Windows Overview Ransomware is a type of malicious software (malware) that infects a computer and restricts access to it until a ransom is paid to unlock it. This Alert is the result of Canadian Cyber Incident Response...
  10. whoosh

    NEWS First Shellshock botnet attacks Akamai, US DoD networks

    Wopbot on the rampage. Attackers have been quick to exploit the Shellshock Bash command interpreter bug disclosed yesterday by building a botnet that is currently trying to infect other servers, according to a security researcher. The "wopbot" botnet is active and scanning the internet for...
  11. News

    TA13-088A: DNS Amplification Attacks

    Original release date: March 29, 2013 Systems Affected Domain Name System (DNS) servers Overview A Domain Name Server (DNS) Amplification attack is a popular form of Distributed Denial of Service (DDoS) that relies on the use of publically accessible open recursive DNS servers to...
  12. kemical

    VIDEO One minute of Botnet

    Link Removedhas published an interesting video that shows the global activity of computers that are unknowing participants in a botnet. The activity was recorded on Monday, June 11, 2012, between 9:00 and 9:01 EDT.
  13. JMH

    Windows 7 Microsoft offers $250,000 reward for information on botnet

    Link Removed due to 404 Error
  14. JMH

    Windows 7 Microsoft offering $250,000 reward for Rustock botnet info

    Microsoft offering $250,000 reward for Rustock botnet info | ZDNet
  15. JMH

    Windows 7 Microsoft lawyer claims no botnet is indestructible

    Link Removed
  16. JMH

    Windows 7 Rustock updates and Advance Notification Service for the July 2011 Security Bulletin Release.

    Rustock updates and Advance Notification Service for the July 2011 Security Bulletin Release - MSRC - Site Home - TechNet Blogs
  17. News

    Rustock updates and Advance Notification Service for the July 2011 Security Bulletin Release

    Hello all -- This week we released a Link Removedthat showcases some of the data we amassed in the wake of the big Rustock botnet takedown in the spring of 2010. The new SIR also delves into the diplomacy, secrecy and intellectual property law that all played important roles in the successful...
  18. reghakr

    Microsoft fingers Russians over Rustock spam botnet

    The Rustock botnet, taken down earlier this year in a Microsoft-led action, appears to have been operated by Russians according to evidence collected by the company. Court action by Microsoft saw the Rustock botnet taken offline in March, causing an almost immediate drop in global spam...
  19. cybercore

    700,000 stolen condoms found by police in Malaysia

    Microsoft Corp (MSFT.O) claimed credit on Thursday for taking down one of the biggest producers of spam e-mail in a joint effort with federal authorities across the United States. The world's biggest software company said its legal action against the operator of the Rustock 'botnet' -- or...
  20. whoosh

    Windows 7 The do-it-yourself botnet kit

    Security researchers from antivirus vendor ESET have uncovered a simple tool automating the creation of botnets that can be controlled from Twitter. The botnet clients can be commanded to launch Distributed Denial of Service (DDoS) attacks or install additional malware on the compromised...
Back
Top