Taking down botnets
β Scribed by Steve Gold
- Book ID
- 104392943
- Publisher
- Elsevier Science
- Year
- 2011
- Tongue
- English
- Weight
- 346 KB
- Volume
- 2011
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
β¦ Synopsis
One of the best-known botnets is Mariposa, also known as pixeLb0tx, which was first tracked in the fourth quarter of 2008 and spent most of 2009 with 8-12 million PCs worldwide operating quietly under its remote control. Mariposa's aim was quite simple -once installed on a previously uninfected host computer, the malware code monitored for passwords, bank credentials and 16-digit payment card strings -plus allied data such as expiry dates and three-digit Card Verification Value (CVV) numbers used to make online transactions. Once a host PC was infected, Mariposa then propagated itself to as many other computers as possible using any -and all -IP channels available, including instant messaging, peer-to-peer, USB sticks and, of course, email attachments.
π SIMILAR VOLUMES
T he benefits of cloud computing have been well documented, as have the security risks associated with entrusting your data to a third party.
Spying the browser: dissecting the design of malicious extensions Routing around censorship Featured this issue: T he actions of governments in restrict- ing Internet access have resulted in a variety of anti-censorship tools and technologies. These range from the Chaos Computer Club's USB key-based
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following c