Botnet

Buggy DIY botnet tool leaks in black market

By

A new do-it-yourself botnet generating tool has leaked in the wild, but miscreants believe it's not worth its $10,000 price tag.

Ransomware and phish cons target Skype users

By

Over the course of a week, two trojan-spreading scams have emerged that aim for users of the internet phone service.

Why smaller companies are cyber crime's sweet spot

Why smaller companies are cyber crime's sweet spot

Cyber criminals are always looking for ways to fill their pockets, but SMBs seem to be a prime target.

Report: Most ZeroAccess zombie computers found in U.S.

By

Researchers have discovered that a majority of the infected machines enlisted in a botnet capable of stealing up to $100,000 per day are based in the United States.

TDL-4 variant spreads click-fraud campaign

By

The latest TDL-4 malware version uses a domain-generation algorithm, so its command-and-control infrastructure can skirt detection.

New Pushdo variant infects more than 100k computers

By

Since July, researchers have been tracking a new variant of Pushdo, which is mixing command-and-control traffic with bogus HTTP requests to legitimate sites with the goal of evading detection.

Industrial crimeware sets a blistering pace

Industrial crimeware sets a blistering pace

Industrialization is a key factor driving the rate at which criminals are turning to malicious software to make serious money.

Grum botnet dead after remaining servers are shut off

By

One of the world's largest spam botnets, responsible for as much as a third of all unwanted mail sent as recently as last week, is finally offline, according to security firm FireEye.

Dutch police disable Grum botnet to slow spam spread

By

While Dutch law enforcement managed to shut down two C&C servers, the Grum botnet is still active. And if its controllers are so inclined, they can continue to deliver spam.

Google, researchers question if Android spam botnet is real

By

The existence of an Android spam botnet is disputed, with some saying more proof is needed. No matter the truth, the incident underscores the dangers of installing mobile applications from unofficial sources.

Russian authorities arrest operator of Carberp bank botnet

By

A 22-year-old, accused of using modified versions of the Carberp banking trojan to steal login details and digital signatures from compromised computers, was apprehended in Russia.

News briefs: The latest news from Apple, Verizon and more

News briefs: The latest news from Apple, Verizon, CrowdStrike, FTC and more

Debate: Identifying culprits behind Koobface disrupts the gang's activity

Debate: Identifying the culprits behind Koobface will diminish the gang's activity.

Thanks to weak passwords, Conficker worm still rampant

By

Detection numbers continue to rise for the infamous Conficker worm within enterprises, even though there is a patch available and no new variants have appeared in two years.

WordPress sites served as launching pad for Flashback

By

Researchers have discovered a correlation between infected WordPress sites and the propagation of the prolific Mac Flashback trojan.

Flashback botnet activity cools over the weekend

By

Security researchers said the number of Flashback-infected Mac computers significantly fell over the weekend, but that doesn't mean the botnet has been crippled.

Apple releases another update to quell Flashback spread

By

Security experts are backing up one anti-virus vendor's estimate of the massive size of a Mac trojan botnet.

Kelihos lives on thanks to Facebook trojan

By

After being "sinkholed," the Kelihos.B botnet has been reconfigured and is spreading through social networking sites.

New version of Kelihos botnet, with 110K nodes, cut down

By

A collaborative effort of security organizations announced Wednesday that they knocked offline an embodiment of the Kelihos botnet, which was believed dead, but since emerged with new capabilities.

New botnet working group forms out of government efforts

By

A new industry working group, the Industry Botnet Group, is aimed at developing a model that focuses on creating awareness, prevention and privacy concerning infected machines.

Feedback due on gov't proposal around botnet notification

By

Friday is the deadline for public comments regarding a government proposal to create a model by which internet service providers voluntarily alert consumers if their computers are part of a botnet.

Microsoft disrupts Kelihos botnet, names alleged mastermind

By

The Kelihos botnet, made up of approximately 41,000 infected computers worldwide, was capable of sending 3.8 billion spam emails per day.

Microsoft wins Rustock civil case, passes evidence to FBI

By

Microsoft has prevailed in its civil case against the operators of the Rustock botnet, which in its heyday controlled a network of more than a million computers.

Hacker "soldier" steals $3.2 million from U.S. companies

By

Researchers at Trend Micro say they have been hot on the tracks of a corporate hacker, and now they are turning over their findings to U.S. law enforcement.

McAfee fires back at Shady RAT criticism

By

McAfee has fired back at critics of its report on Operation Shady RAT, and said the CEO of rival anti-virus maker Kaspersky Lab, who called the report "alarmist," missed the whole point of the expose.

New "indestructible" botnet comprised of 4.5 million PCs

By

A new botnet made up of more than 4.5 million infected computers is "practically indestructible," according to researchers at Kaspersky Lab. But some disagree.

DoJ, FBI disable massive Coreflood botnet

By

Federal authorities have taken over the control hub of the prolific Coreflood botnet and filed a civil complaint against 13 unnamed defendants.

Canadian researchers simulate botnet

By

Scientists in Canada have replicated a botnet to study its behaviour, infecting 3,000 virtual machines with the Waledec malware.

Spam, after a holiday hiatus, returns in earnest

By

The Rustock botnet, dubbed the biggest source of global spam, has resumed activity after a two-week break, according to security researchers at Symantec.

DDoS attacks commonly leaned on to mute rights groups

By

Advocacy groups and independent media face a variety of damaging cyberattacks, and there is little they can do to stop them, a new study from Harvard University concludes.

Sign up to our newsletters

POLL