Original release date: October 14, 2016
Systems Affected
Internet of Things (IoT)—an emerging network of devices (e.g., printers, routers, video cameras, smart TVs) that connect to one another via the Internet, often automatically sending and receiving data
Overview
Recently, IoT devices...
Original release date: December 03, 2015
Systems Affected
Microsoft Windows
Overview
Dorkbot is a botnet used to steal online payment, participate in distributed denial-of-service (DDoS) attacks, and deliver other types of malware to victims’ computers. According to Microsoft, the family of...
Original release date: October 22, 2014
Systems Affected
Microsoft Windows
Overview
Ransomware is a type of malicious software (malware) that infects a computer and restricts access to it until a ransom is paid to unlock it. This Alert is the result of Canadian Cyber Incident Response...
Wopbot on the rampage.
Attackers have been quick to exploit the Shellshock Bash command interpreter bug disclosed yesterday by building a botnet that is currently trying to infect other servers, according to a security researcher.
The "wopbot" botnet is active and scanning the internet for...
Original release date: March 29, 2013
Systems Affected
Domain Name System (DNS) servers
Overview A Domain Name Server (DNS) Amplification attack is a popular form of Distributed Denial of Service (DDoS) that relies on the use of publically accessible open recursive DNS servers to...
Link Removedhas published an interesting video that shows the global activity of computers that are unknowing participants in a botnet.
The activity was recorded on Monday, June 11, 2012, between 9:00 and 9:01 EDT.
advance service
botnet
bulletin
cybersecurity
diplomacy
intellectual property
international
july 2011
law
microsoft
notification
report
rustock
security
sir
takedown
update
Hello all --
This week we released a Link Removedthat showcases some of the data we amassed in the wake of the big Rustock botnet takedown in the spring of 2010. The new SIR also delves into the diplomacy, secrecy and intellectual property law that all played important roles in the successful...
analysis
botnet
bulletin
critical
diplomacy
guidance
important
intellectual property
july
microsoft
office
rustock
security
takedown
update
vulnerabilities
webcast
windows
The Rustock botnet, taken down earlier this year in a Microsoft-led action, appears to have been operated by Russians according to evidence collected by the company.
Court action by Microsoft saw the Rustock botnet taken offline in March, causing an almost immediate drop in global spam...
Microsoft Corp (MSFT.O) claimed credit on Thursday for taking down one of the biggest producers of spam e-mail in a joint effort with federal authorities across the United States.
The world's biggest software company said its legal action against the operator of the Rustock 'botnet' -- or...
Security researchers from antivirus vendor ESET have uncovered a simple tool automating the creation of botnets that can be controlled from Twitter. The botnet clients can be commanded to launch Distributed Denial of Service (DDoS) attacks or install additional malware on the compromised...
A Trojan buried within counterfeit copies of Windows 7 RC was used to build a botnet of compromised PCs
Pirate Win 7 ruse used to build botnet â€Ã‚¢ The Register