Massive botnet loose on Windows XP.

J

Jack The Ripper

<http://www.computerweekly.com/Artic...hers-uncover-massive-fast-growing-botnet.htm?


The botnet has been in use since February and is hosted in the Ukraine,
according to a report by security firm Finjan.

They have tied the botnet to a six-member cybergang that was selling
control of batches of 1,000 compromised computers for as little as £30
to £70.

The cybercriminals were enable to infect end-user computers through
legitimate websites with malware that bypassed 90% of common anti-virus
software.

The malware is designed to work in the Windows XP operating system and
takes advantage of security vulnerabilities in a range of browsers.

ADVERTISEMENT
Most infections (78%) were through Microsoft's Internet Explorer
browser, followed by Mozilla's Firefox (15%), Opera (3%) and Safari
(3%), the report said.

The malware enabled the cybercriminals to execute almost any command on
targeted machines, including copying files and recording keystrokes.

The botnet was uncovered when the researchers traced calls from a Trojan
back to its command-and-control centre.

UK government computers were among the compromised computers in 77
government-owned domains, the researchers found.

Finjan alerted US and UK authorities and notified government departments
and businesses whose computers were part of the botnet.

UK police are liaising with other international agencies involved in the
investigation.

"No other information can be revealed," said detective chief inspector
Charlie McMurdie, who heads the investigative arm of the Police Central
E-Crime Unit (PCeU).

The sophistication of the malware and rapid infection rate proves
cybercriminals are raising the bar and shows how vulnerable
organisations are to this type of attack, said Yuval Ben-Itzhak, CTO of
Finjan.

The fact that the malware bypassed such a high percentage of anti-virus
products shows the need for a multi-layered approach to defence, he said.

According to Ben-Inzhak, signature-based detection methods are no longer
effective against rapidly changing malware.

Instead, organisations need to combine web security, data leakage
prevention and URL filtering to strengthen the network perimeter.

It is easier to control what comes in and out of the corporate network
than to patch every browser ad-on, which is usually slow and difficult
to manage, he said.
 
M

measekite Da Monkey

Wow - you can copy and paste. Where did you learn that? How long did it
take you to master the technology?
 
A

Alias

Jack said:
<http://www.computerweekly.com/Artic...hers-uncover-massive-fast-growing-botnet.htm?



The botnet has been in use since February and is hosted in the Ukraine,
according to a report by security firm Finjan.

They have tied the botnet to a six-member cybergang that was selling
control of batches of 1,000 compromised computers for as little as £30
to £70.

The cybercriminals were enable to infect end-user computers through
legitimate websites with malware that bypassed 90% of common anti-virus
software.

The malware is designed to work in the Windows XP operating system and
takes advantage of security vulnerabilities in a range of browsers.

ADVERTISEMENT
Most infections (78%) were through Microsoft's Internet Explorer
browser, followed by Mozilla's Firefox (15%), Opera (3%) and Safari
(3%), the report said.

The malware enabled the cybercriminals to execute almost any command on
targeted machines, including copying files and recording keystrokes.

The botnet was uncovered when the researchers traced calls from a Trojan
back to its command-and-control centre.

UK government computers were among the compromised computers in 77
government-owned domains, the researchers found.

Finjan alerted US and UK authorities and notified government departments
and businesses whose computers were part of the botnet.

UK police are liaising with other international agencies involved in the
investigation.

"No other information can be revealed," said detective chief inspector
Charlie McMurdie, who heads the investigative arm of the Police Central
E-Crime Unit (PCeU).

The sophistication of the malware and rapid infection rate proves
cybercriminals are raising the bar and shows how vulnerable
organisations are to this type of attack, said Yuval Ben-Itzhak, CTO of
Finjan.

The fact that the malware bypassed such a high percentage of anti-virus
products shows the need for a multi-layered approach to defence, he said.

According to Ben-Inzhak, signature-based detection methods are no longer
effective against rapidly changing malware.

Instead, organisations need to combine web security, data leakage
prevention and URL filtering to strengthen the network perimeter.

It is easier to control what comes in and out of the corporate network
than to patch every browser ad-on, which is usually slow and difficult
to manage, he said.

Another good reason not to use Windows.

Alias
 
J

Jack The Ripper

measekite said:
Wow - you can copy and paste. Where did you learn that? How long did it
take you to master the technology?


Wow - you can cross-post. Where did you learn that? I know it didn't
take you long to master that. You are a natural *llort*, a responder,
and you can reverse spell the word.
 
M

measekite Da Monkey

Jack The Ripper said:
Wow - you can cross-post. Where did you learn that? I know it didn't take
you long to master that. You are a natural *llort*, a responder, and you
can reverse spell the word.

Hey dipshit, where do you see cross posting? Again, you need more training.
I suggest going to the library and checking out some books. Give them to
someone who can read.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top