𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Taking down botnets

✍ Scribed by Steve Gold


Book ID
104392943
Publisher
Elsevier Science
Year
2011
Tongue
English
Weight
346 KB
Volume
2011
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

✦ Synopsis


One of the best-known botnets is Mariposa, also known as pixeLb0tx, which was first tracked in the fourth quarter of 2008 and spent most of 2009 with 8-12 million PCs worldwide operating quietly under its remote control. Mariposa's aim was quite simple -once installed on a previously uninfected host computer, the malware code monitored for passwords, bank credentials and 16-digit payment card strings -plus allied data such as expiry dates and three-digit Card Verification Value (CVV) numbers used to make online transactions. Once a host PC was infected, Mariposa then propagated itself to as many other computers as possible using any -and all -IP channels available, including instant messaging, peer-to-peer, USB sticks and, of course, email attachments.


πŸ“œ SIMILAR VOLUMES


Bredolab botnet taken down
πŸ“‚ Article πŸ“… 2010 πŸ› Elsevier Science 🌐 English βš– 164 KB

T he benefits of cloud computing have been well documented, as have the security risks associated with entrusting your data to a third party.

Million computers take on botnets
✍ Vetter, Douglas E.; SaldaΓ±a, Enrique; Mugnaini, Enrico πŸ“‚ Article πŸ“… 2009 πŸ› Reed Business 🌐 English βš– 118 KB
US Government takes over Coreflood botne
πŸ“‚ Article πŸ“… 2011 πŸ› Elsevier Science 🌐 English βš– 240 KB

Spying the browser: dissecting the design of malicious extensions Routing around censorship Featured this issue: T he actions of governments in restrict- ing Internet access have resulted in a variety of anti-censorship tools and technologies. These range from the Chaos Computer Club's USB key-based

Botnets || Botnets Overview
✍ Schiller, Craig A. πŸ“‚ Article πŸ“… 2007 πŸ› Elsevier 🌐 English βš– 762 KB

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following c

Botnets || IRC and Botnets
✍ Schiller, Craig A. πŸ“‚ Article πŸ“… 2007 πŸ› Elsevier βš– 421 KB