Massive botnet loose on Windows XP.

Discussion in 'Windows Vista General Discussion' started by Jack The Ripper, Apr 23, 2009.

  1. <

    The botnet has been in use since February and is hosted in the Ukraine,
    according to a report by security firm Finjan.

    They have tied the botnet to a six-member cybergang that was selling
    control of batches of 1,000 compromised computers for as little as £30
    to £70.

    The cybercriminals were enable to infect end-user computers through
    legitimate websites with malware that bypassed 90% of common anti-virus

    The malware is designed to work in the Windows XP operating system and
    takes advantage of security vulnerabilities in a range of browsers.

    Most infections (78%) were through Microsoft's Internet Explorer
    browser, followed by Mozilla's Firefox (15%), Opera (3%) and Safari
    (3%), the report said.

    The malware enabled the cybercriminals to execute almost any command on
    targeted machines, including copying files and recording keystrokes.

    The botnet was uncovered when the researchers traced calls from a Trojan
    back to its command-and-control centre.

    UK government computers were among the compromised computers in 77
    government-owned domains, the researchers found.

    Finjan alerted US and UK authorities and notified government departments
    and businesses whose computers were part of the botnet.

    UK police are liaising with other international agencies involved in the

    "No other information can be revealed," said detective chief inspector
    Charlie McMurdie, who heads the investigative arm of the Police Central
    E-Crime Unit (PCeU).

    The sophistication of the malware and rapid infection rate proves
    cybercriminals are raising the bar and shows how vulnerable
    organisations are to this type of attack, said Yuval Ben-Itzhak, CTO of

    The fact that the malware bypassed such a high percentage of anti-virus
    products shows the need for a multi-layered approach to defence, he said.

    According to Ben-Inzhak, signature-based detection methods are no longer
    effective against rapidly changing malware.

    Instead, organisations need to combine web security, data leakage
    prevention and URL filtering to strengthen the network perimeter.

    It is easier to control what comes in and out of the corporate network
    than to patch every browser ad-on, which is usually slow and difficult
    to manage, he said.
    Jack The Ripper, Apr 23, 2009
    1. Advertisements

  2. Stuff it, news boy.
    Addison Steele, Apr 23, 2009
    1. Advertisements

  3. Wow - you can copy and paste. Where did you learn that? How long did it
    take you to master the technology?
    measekite Da Monkey, Apr 23, 2009
  4. Jack The Ripper

    Alias Guest

    Another good reason not to use Windows.

    Alias, Apr 23, 2009

  5. Wow - you can cross-post. Where did you learn that? I know it didn't
    take you long to master that. You are a natural *llort*, a responder,
    and you can reverse spell the word.
    Jack The Ripper, Apr 23, 2009
  6. I bet you use XP. :p
    Jack The Ripper, Apr 23, 2009
  7. Hey dipshit, where do you see cross posting? Again, you need more training.
    I suggest going to the library and checking out some books. Give them to
    someone who can read.
    measekite Da Monkey, Apr 23, 2009
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.