botnet

Mon
22
Nov
Dennis Faas's picture

Zombie PC Network Takedowns Drop Spam 47% in Q3: Report

The worldwide volume of spam has decreased in the third quarter of this year, thanks in large part to the mass shutdowns of some major botnet systems . In their latest reports, security software companies Symantec and Kaspersky have found that spam ... volumes decreased 47 percent compared to August figures. Botnets are formed when (for example) malicious software is unknowingly installed on an MS Windows PC. That PC then becomes part of a "zombie network" of infected systems which are then used to propagate spam email messages. Kaspersky weighed in on the correlation between legitimate ... (view more)

Thu
14
Oct
Dennis Faas's picture

Windows Botnet Infections On the Rise, says Microsoft

According to a recent report from Microsoft, the Redmond-based software company removed 6.5 million botnets from Windows machines during the first period of 2010 -- which is more than double the number eliminated by the firm over the same period in ... 2009. Botnets Used to Spam, Spread Malware, Steal Secrets In simple terms, a botnet (or "robot network") is a group of infected PCs that are under control of a few (or 1) individual. Typically, a PC becomes infected by visiting a malicious website, or by opening a malicious file or email. Once a computer is infected with botnet malware, ... (view more)

Mon
13
Sep
Dennis Faas's picture

Microsoft Wins Major Victory Against Zombie PC Networks

Microsoft has convinced a judge to grant it legal ownership of 276 web domains previously used to control networks of infected PCs. It's the first time this has happened, and the company believes it could be used as a legal weapon. The case involves ... a botnet , created from computers infected with the Waledeac worm . A botnet is short form for "robot network" -- or quite simply, a network of infected computers controlled by one or few individuals. Botnet Sends 1.5 Billion Spam Email Messages Per Day At one point an estimated 80,000 computers were under part of the botnet and were ... (view more)

Thu
05
Aug
Dennis Faas's picture

Researchers Expose Botnet Packing 60GB of Stolen Data

A recently discovered botnet packing approximately 60 gigabytes (GB) of passwords and other stolen data has been opened up by security researchers. The crack was made in spite of the botnet's difficult-to-detect, self-cloaking ability. Known as ... Mumba, the botnet intercepted and amassed data from 55,000 PCs when it was first investigated, says security firm AVG. It's believed well-known data thieves "Avalanche Group" were responsible for the botnet. According to a report earlier in 2010, Avalanche was responsible for about two in every three phishing attacks during the last six ... (view more)

Wed
19
May
Dennis Faas's picture

Security Researchers Uncover Do-It-Yourself Twitter Botnet

More and more research is proving that those who know how to create viruses and malware are keen on reaching out to others, most likely to cash in on their deceptive knowledge. Such can be proven with TwitterNet Builder: a new tool designed to ... simplify botnet-based attacks over Twitter. Botnets: A Virtual Army of Zombie Computers For those unaware, a botnet is a technical term used to describe a network of computers under the control of a malicious software program. Once a computer has become compromised, the botnet program runs silently and autonomously until issued a command from a master ... (view more)

Fri
05
Mar
Dennis Faas's picture

Spanish Police Arrest Hacker Trio, 13M PCs Infected

Spanish police have arrested three individuals for what is believed to be one of the biggest computer crimes in history. At a news conference delivered this past Wednesday, police revealed that malicious programs created by the accused were used to ... steal bank details from computers all over the world, and that these programs had the potential to cripple the computer systems of an entire country. The accused men are said to be between the ages of 25 and 31, each from a small town in Spain. 13 Million Infected PCs in Control Their transition into hacking came after the acquisition of a virus ... (view more)

Mon
01
Mar
Dennis Faas's picture

New 'Chuck Norris' Botnet Infects Routers, Modems

A new botnet that carries the namesake of perhaps the most famous American-born martial arts actor of all time is causing quite a stir across the Internet. The botnet received its name from a comment (written in Italian) in its source code: "in nome ... di Chuck Norris" which translates: "in the name of Chuck Norris". So, how does one get infected with the infamous Chuck Norris botnet? Those who have yet to change the default password on their home router are the most susceptible to an attack. Norris Infects DSL Modems and Routers The Chuck Norris botnet is also unusual because it infects DSL ... (view more)

Mon
28
Dec
Dennis Faas's picture

Man Challenges 250,000 Strong Botnet and Succeeds

When security officials decide to "go after" computer malware, most conduct their actions from a defensive standpoint. For most of us, finding a way to rid a computer of the malware suffices -- but for one computer researcher, however, the change ... from a defensive to an offensive mentality is what ended the two year chase of a sinister botnet once and for all. For two years, Atif Mushtaq had been keeping the notorious Mega-D bot malware from infecting computer networks. As of this past November, Mega-D had forced more than 250,000 PCs to do its bidding via botnet control. That's when Mushtaq ... (view more)

Tue
19
May
Dennis Faas's picture

Botnet

Botnet is a jargon term for a collection of software robots, or "bots," that run autonomously and automatically. The term is often associated with malicious software but it can also refer to the network of computers using distributed computing ... software. Zombie Computers and Botnets While the term "botnet" can be used to refer to any group of bots, the word is generally used to refer to a collection of compromised computers (called Zombie computers) running software, usually installed via worms, Trojan horses, or backdoors, under a common command-and-control infrastructure. How it ... (view more)

Pages

Subscribe to RSS - botnet