Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] [Rival] Microsoft Windows Makes Botnet Disasters

  • Subject: [News] [Rival] Microsoft Windows Makes Botnet Disasters
  • From: Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx>
  • Date: Sun, 14 Mar 2010 01:13:54 +0000
  • Followup-to: comp.os.linux.advocacy
  • Newsgroups: comp.os.linux.advocacy
  • User-agent: KNode/4.3.1
Hash: SHA1

Trojan armed with hardware-based anti-piracy control

,----[ Quote ]
| The latest version of the Zeus do-it-
| yourself crimeware kit goes to great 
| lengths to thwart would-be pirates by 
| introducing a hardware-based product 
| activation scheme similar to what's found 
| in Microsoft Windows.
| The newest version with bare-bones 
| capabilities starts at $4,000 and 
| additional features can fetch as much as 
| $10,000. The new feature is designed to 
| prevent what Microsoft refers to as "casual 
| copying" by ensuring that only one computer 
| can run a licensed version of the program. 
| After it is installed, users must obtain a 
| key that's good for just that one machine.


One-third of orphaned Zeus botnets find way home

,----[ Quote ]
| The takedown of 100 servers used to control 
| Zeus-related botnets may be a short-lived 
| victory, security researchers said after 
| discovering that about a third of the 
| orphaned channels were able to regain 
| connectivity in less than 48 hours.
| The resurrection of at least 30 command and 
| control channels came after their internet 
| service provider found a new upstream 
| provider to provide connectivity to the 
| outside world, autonomous system records 
| showed on Thursday. As a result, some of 
| the rogue customers who used the Troyak ISP 
| to herd huge numbers of infected PCs were 
| able to once again connect to the 
| compromised machines and issue commands.



No April Fools'--Storm worm is back

,----[ Quote ]
| The compromised computer will then install the downloaded file as C:
| \WINDOWS\aromis.exe. Nazario reports that the botnet file opens the firewall 
| using the netsh firewall set command, makes a lot of outbound connections, 
| then listens on a random UDP port.   

Version: GnuPG v1.4.9 (GNU/Linux)


[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index