Results for "botnet"
September 16, 2019 - After months of laying dormant, the notorious Emotet is back, with its botnet spewing spam globally.
April 29, 2019 - We've identified a new piece of malware that is connected to the Electrum botnet.
November 28, 2018 - Malwarebytes joins the fight against ad fraud in one of the largest take down operations in recent history.
December 15, 2016 - We’ve found a scam in a box company that also offers intelligence leads. That is, they’ll sell you the scam and point you at the most vulnerable targets first.
Synonym: zombie network
Botnets are networks of computers infected by a botnet agent that are under hidden control of a third party. They are used to execute various commands ordered by the attacker. Most common uses of botnets are criminal operations that require distributed resources, such as DDoS attacks on selected targets, spam campaigns, and performing click fraud. Often, the botnet agent is ordered to download and install additional payloads or to steal data from the local computer.
From the moment of infection, botnet agents keep in touch with their remote Command-and-Control server (C&C). The communication can be carried by various means, and cybercriminals keep on inventing in new methods to hide their data transmission channels. There have been some unusual ways via social media like Twitter or reddit to send commands. However, the most common implementation of the C&C is a web-application, contacted by the client via simple HTTP requests.
August 19, 2015 - We recently found a leaked package containing a Neutrino botnet builder. Although it's not the latest version, as usually is the case, it still provided a lot of information that helped in our comparative analysis with samples that are actively distributed nowadays.
February 6, 2015 - Botnets were used to take down Xbox and Playstation's network during the holidays. But did you know that botnets were originally designed to be helpful? Learn more about botnets.
February 25, 2014 - Cyber criminals can infiltrate your mobile devices with the just discovered first "TOR Trojan for Android".
September 11, 2013 - Learn more about a SMS fraud network that is particularly active in Eastern Europe and involves trojanized apps luring users with the usual culprits: fake software updates and porn.