botnet

  • Crooks Reanimate A Dead Botnet To Target High-Value Bank Accounts

    Crooks Reanimate A Dead Botnet To Target High-Value Bank Accounts

    In something that sounds like the plot of a Hollywood movie, hackers have reanimated an apparently dead botnet called Gameover Zeus even as malware researchers dismantled the previous version of the network. The botnet, essentially a collection of zombie computers that can be activated to perform denial of service attacks on banks and other financial firms in order to hide thefts from… Read More

  • Microsoft Offers A Cloud Approach To A Legacy Problem With New Anti-Botnet Program

    Microsoft Offers A Cloud Approach To A Legacy Problem With New Anti-Botnet Program

    Microsoft is┬ámoving its botnet protection group to the cloud to provide near real-time information about known malware infections starting to surface. Microsoft is making the new program available to Internet Service Providers (ISPs) and computer emergency response teams (CERT) who are responsible for monitoring malware and other threats in their organizations. Read More

  • Hackers Point Large Botnet At WordPress Sites To Steal Admin Passwords And Gain Server Access

    Hackers Point Large Botnet At WordPress Sites To Steal Admin Passwords And Gain Server Access

    If you’re running a WordPress site, now would be a good time to ensure you are using very strong passwords and to make sure your username is not “admin.” According to reports from HostGator and CloudFlare, there is currently a significant attack being launched at WordPress blogs across the Internet. For the most part, this is a brute-force dictionary-based attack that aim to… Read More

  • Grum: Inside The Takedown Of One Of The World’s Biggest Spam Networks

    Grum: Inside The Takedown Of One Of The World’s Biggest Spam Networks

    As Spring cracked the Moscow frosts and March rains doused the streets, a computer in an innocuous server farm somewhere in the heart of the city winked to life. It was 2007, a year when many people became truly invested in online life. Twitter was a year old and the most popular smartphone was the Blackberry Curve – a pure email machine. It was a year ripe with promise for cyber-everything. Read More

  • Sound Of Silence: Researchers Nearly Shut Down Grum Spam Network

    Sound Of Silence: Researchers Nearly Shut Down Grum Spam Network

    Notice anything weird about your email inbox? If you said there wasn’t as much spam lately that’s because researchers at FireEye and the venerable SpamHaus have essentially shut down the Grum botnet by marking and banning IP addresses. The botnet was responsible for 18% of the world’s spam and had lassoed 560,000 to 840,000 computers using a rootkit. Read More

  • Seculert Gets $5.35 Million Investment For Cloud-Based Botnet Detection Service

    Seculert Gets $5.35 Million Investment For Cloud-Based Botnet Detection Service

    Seculert announced a $5.35 million round of funding today led by Norwest Venture Partners for the Israeli company’s next generation advanced threat detection service. Seculert is s a software-as-a-service that detects back doors in your network. It finds malware attacks that have previously gone undetected. Read More

  • Researchers take over botnet, grab 56,000 passwords an hour

    Researchers from the University of California, Santa Barbara, have published a report after taking over a massive botnet called Torpig aka Sinowal. The malware network was able to collect 56,000 passwords and hour as well as 70GB of financial and personal data. The researchers found that most users reused passwords for multiple sites and that the malware was able to steal credit card numbers… Read More

  • Shadow botnet puts itself out to pasture

    Shadow botnet puts itself out to pasture

    Two Dutch brothers are charged with operating the Shadow botnet, which infected upwards of 150,000 computers. After the botnet takedown was secured, The Dutch High Tech Crime Unit enlisted the help of Kaspersky Labs to help dismantle the network. The Russian lab not only wrote up instructions for removing Shadow, but used Shadow itself for notifying users that their computers were infected. Read More

  • Russian gang goes after network administrators

    Russian gang goes after network administrators


    The New York Times reported that a gang of Russian criminals has been using network admin software as part of a nefarious plot to hijack thousands of PCs for passwords and other personal information. The gang, first identified in May by Joe Stewart, director of malware at research firm SecureWorks, was found to be running a keystroke recording program siphoning information from more than… Read More