Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43434
  • Total Topics: 16528
  • Online today: 3056
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 3
Guests: 2983
Total: 2986









Author Topic: Microsoft Takes Down 277 Waledac Botnet Domains  (Read 3443 times)

0 Members and 1 Guest are viewing this topic.

Samker

  • SCF Administrator
  • *****
  • Posts: 7529
  • KARMA: 322
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • SCforum.info - Samker's Computer Forum
Microsoft Takes Down 277 Waledac Botnet Domains
« on: 26. February 2010., 07:03:34 »


An operation launched by the Microsoft Digital Crimes Unit has successfully taken down a slew of command and control servers hosting  the malicious spam botnet  Waledac.

The Waledac takedown is the culmination of a months-long investigation and legal strategizing on the part of Microsoft in an effort known as "Operation b49." The software giant received a temporary restraining order on Monday from a federal court in Alexandria, Va. for VeriSign, which oversees the operation of the .com and .net top domains, to disconnect 277 domains associated with the botnet. The domains which were suspected to be hosted in China.

"At Microsoft, we don't accept the idea that botnets are a fact of life," said Tim Cranton, Microsoft associate general counsel, in a company blog post. "That's why I'm proud to announce that through legal action and technical cooperation with industry partners, we have executed a major botnet takedown of Waledac, a large and well-known "spambot."

As one of the top 10 largest botnets in the U.S., Waledac was one of the biggest distributors of online pharmaceutical spam as well as other fraud schemes and phony merchandise. Microsoft said that Waledac was estimated to have infected hundreds of thousands of computers around the world, retaining a capacity to send more than 1.5 billion spam e-mails per day.

Like the notorious predecessor Storm, Waledac employed a fast-flux technique, which rapidly changed the IP addresses of the Websites used to distribute spam in order to evade detection mechanisms tracking malicious servers.

Computers infected by the Waledac botnet were turned into drones and fell under the control of the botnet owners -- known as bot herders -- who used the compromised machines to distribute copious amounts of spam.

The botnet was particularly irksome to Microsoft, in part, because it affected approximately 651 spam e-mails targeting Hotmail accounts with scams related to knock-off merchandise, work-from-home job offers, and pump-and-dump stock schemes, as well as online pharmacies.

Microsoft claims that the legal action "quickly and effectively" cut off traffic to Waledac at the .com domain, which severed the connection it had to its hundreds of command and control centers communicating with hundreds of thousands of affected bot computers.

"Microsoft has since been taking additional technical countermeasures to downgrade much of the remaining peer-to-peer command and control communication within the botnet, and we will continue to work with the security community to mitigate and respond to this botnet," Cranton said.

While Microsoft acknowledged that disconnecting Waledac from its domains was a first step, affected users will still have to deal with malware that still resides on their computers.

'The operation hasn't cleaned the infected computers and is not a silver bullet for undoing all the damage we believe Waledac has caused," Cranton said. "Although the zombies are now largely out of the bot-herders' control, they are still infected with the original malware."

As a precaution, Microsoft recommends that users download Microsoft's Malicious Software Removal Tool, which cleans the Waledac malware from users' machines, while recommending that users install and maintain up-to-date anti-virus and anti-spyware to reduce risk of infection: http://www.microsoft.com/security/malwareremove/default.aspx

(Channel)

Samker's Computer Forum - SCforum.info

Microsoft Takes Down 277 Waledac Botnet Domains
« on: 26. February 2010., 07:03:34 »

xtremeboyz

  • SCF Member
  • **
  • Posts: 30
  • KARMA: 4
Re: Microsoft Takes Down 277 Waledac Botnet Domains
« Reply #1 on: 26. February 2010., 13:07:24 »
cool...

hazedaze

  • SCF VIP Member
  • *****
  • Posts: 85
  • KARMA: 19
  • Gender: Male
Re: Microsoft Takes Down 277 Waledac Botnet Domains
« Reply #2 on: 01. March 2010., 12:24:10 »
Blimey, It proves Ms can do something right once in while!!  ;D

Samker's Computer Forum - SCforum.info

Re: Microsoft Takes Down 277 Waledac Botnet Domains
« Reply #2 on: 01. March 2010., 12:24:10 »

 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023