That make the organizations announced Thursday.
The botnet consisted of tens of thousands of infected computers that were controlled from various servers, who were more in the Netherlands. Most infected computers were in the United States.
The network is not one of the greatest ever, but according to Intel Security unique as the various forms of malware spreading and moved himself constantly so hard the controlling servers were offline pick.
The worm additionally changed shape at each infection which made it difficult for antivirus software to detect the worm. Certain spread malware blocking connections with antivirus sites even.
Netherlands
Initially, the servers were so mainly in the Netherlands which the High Tech Crime Team of the Dutch police took charge of the investigation .
It has been working with the Joint Action Cybercrime Task Force (J-CAT). This European cooperation to combat cybercrime was established in September. It is the first time that a botnet is taken by J-CAT offline.
2009
Intel discovered the botnet in March 2013 and had enough information collected in September 2014 in cooperation with investigative services to take action. The botnet has existed since 2009 and spread among more malware to steal passwords, make bank details loot and send spam.
There was also called ransomeware distributed so that the computer is locked and only after payment is unlocked . How much money the cyber criminals behind the botnet have earned or how many passwords are captured, it is not yet known.
The findings are made public and shared with local investigative agencies and providers. Ultimately, it is the intention to send a message to people who are infected. Software will also be disseminated to clean the PCs again
No comments:
Post a Comment