Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43445
  • Total Topics: 16537
  • Online today: 2791
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 2
Guests: 2791
Total: 2793









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Fireberg
« on: 06. March 2010., 23:56:21 »

One of those motives to these bots exists, peoples are very curious they donĀ“t get away from thats  attachments....they click in everything.

Great post

Thanx
Posted by: duomaxwell22
« on: 04. March 2010., 11:44:57 »

that's great. thanks for making their best.  :thumbsup:
Posted by: Samker
« on: 04. March 2010., 07:16:30 »



Mariposa botnet ran under the radar but was one of the biggest ever.

Spanish authorities have arrested three men in an operation that has crushed a major botnet network of infected computers.

The Mariposa botnet, which appears to be one of the world's largest, took over millions of computers, many of which continue to be infected, security researchers said: http://www.defintel.com/mariposa.shtml

An informal group of volunteers, calling itself the Mariposa Working Group, disabled Mariposa's command-and-control servers on 23 December and handed over information about the criminals behind it to law enforcement in Spain and the US Spain's Guardia Civil is expected to disclose more details of the arrests today, during a morning press conference.

Mariposa-infected computers were linked to 13 million unique Internet Protocol addresses, said Pedro Bustamante, a researcher with Panda Security. It's hard to pinpoint the exact size of the botnet from that number, but it appears to be one of the world's largest. Researchers studying the notorious Conficker botnet have linked it to half as many IP addresses.

However, with the command-and-control servers in the working group's hands, the infected computers cannot be misused right now.

Researchers have spotted Mariposa infections in half of the Fortune 100, as well as hundreds of government agencies, said Chris Davis, CEO of Defense Intelligence, the company that first identified the botnet in May of last year. Defense Intelligence and Panda Security are part of the Mariposa Working Group, as are researchers at Georgia Tech.

The criminals used Mariposa for typical cyberscams: They stole banking credentials and launched distributed denial-of-service (DDoS) attacks. However, they did not use it to push fake antivirus products, a move that helped keep Mariposa under the radar. "The bot was itself very silent," Bustamante said.

One of those DDoS attacks was directed at Defense Intelligence's computers in Ottawa. Angered by the company's efforts to defeat them, the hackers sent data to the company's servers at the rate of 900M bits per second after they briefly regained control of the botnet on Jan. 25.

Antivirus companies did a good job of detecting some versions of the Mariposa code, but the bad guys changed their software often enough -- sometimes every 48 hours -- that many versions of the malware went undetected. "The AV companies couldn't write signatures fast enough," Davis said.

The researchers say that there are still many Mariposa-infected PCs out there, but they are working with antivirus vendors to improve detection and remove the malicious code from the Internet. Over the next month or two, there should be "a pretty big decline" in the number of infected computers, Davis said.

With the help of the Mariposa Working Group, Spanish police arrested the first Mariposa operator in January in Bilbao, Spain, Davis said. The other two men were arrested last week. He was not authorised to release the names of those arrested.

The criminals' fatal mistake was using a real name while registering command-and-control domains, Davis said. They apparently thought they would be anonymous because they used a private domain name registrar, but that company ended up cooperating with the Mariposa Working Group. "There are so many botnets and so many guys doing this," Davis said, "they get cocky; they get careless."

Spain's Guardia Civil could not be reached for comment, but the Associated Press quoted the Guardia Civil's Cesar Lorenza as saying that Mariposa was run by "normal people who are earning a lot of money with cybercrime," who built the botnet with the help of contacts in the criminal underworld: http://hosted.ap.org/dynamic/stories/U/US_TEC_BOTNET_BUSTED?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2010-03-02-14-26-32

The US Federal Bureau of Investigation was involved in the action, but the FBI did not return calls seeking comment Tuesday.

News of the arrests first leaked out in the Spanish media on Monday, Davis said.

(TW)

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023