Microsoft leads FBI and Interpol Coalition to destroy millions of Botnets


Microsoft, FBI and Interpol team up to but a Dorkbot botnet

Microsoft helped FBI and other agencies in destroying massive botnets, which were in a number of millions

Before we start, some of you may want to ask “What is botnet?”. Well, Whenever a malicious code is installed on a remote victim by the ways of phishing or exploiting software vulnerabilities, the victim’s machine becomes a “zombie”. A collection of such zombies in a network is called a botnet.
Discovered in 2011 the Win32/Dorkbot malware has spread to over a million Windows PCs worldwide. During the last six months alone it had been infecting over 100,000 machines a month. Microsoft announced on Wednesday they had teamed up to enact a coordinated malware eradication campaign to disrupt the botnet.
The malware has been spread via a number of routes including USB drives, IM clients, Social Networks, Email and Drive-by downloads. Its primary aim was to steal online user credentials and any information that can personally identify you. It is also able to install yet more malware to your PC from command and control servers.
In order to take down Win32/Dorkbot, Microsoft worked with a number of organizations including ESET, Department of Homeland Security, Europol, FBI and Interpol. The take-down joins a long list of ongoing successful efforts to disrupt malware networks.
Whilst not much was given away on actual specifics of the dismantling technique used, we do know it’s based on their established Coordinated Malware Eradication initiative. The CME program aims to co-ordinate information exchange and response from six key sectors. The goal being: Prosecute, Starve, Identify & Block, shun and set policies. Microsoft strategically cooperating with a diverse set of businesses and institutions, with each having their own role to prosecute in the operation.
  • Security vendors: By sharing detection methods, malware behavior, and unpacking techniques, vendors can more quickly identity and block the malware families as they appear on network-connected endpoints and servers.
  • Financial institutions, online search, and advertising businesses: With better fraudulent behaviour identification, these organizations can starve malware authors of their ill-gotten gains.
  • CERTs and ISPs: Armed with vetted lists, CERTS and ISPs can block and take down deploy sites, and command and control servers.
  • Law enforcement: Using correlated evidence, law enforcement can prosecute the people and organizations behind the malware.
Microsoft’s own real-time security such as Windows Defender is equipped to remove this threat automatically. Advice on how to not become infected remains very much the same.
  • Be cautious when opening emails or social media messages from unknown users.
  • Be wary about downloading software from websites other than the program developers.
  • Run antimalware software regularly.
Microsoft also provides some additional tools which can scan and remove this family of malware.Microsoft Safety Scanner & Malicious Software Removal Tool.
Keep on checking out us for updates and practical tips to stay safe online.
VIA: TECHWORM
Share on Google Plus

About Salman Ahmed Rajput

Hi I am Salman Ahmed, nicknamed as "Sam". I am a technology lover and also a Web Developer. My favorite programming language is PHP which means I usually develop web apps in PHP. Wanna Follow ? Yes? You can follow me at https://facebook.com/Sam.programer
https://twitter.com/SalmanRajz.
    Blogger Comment

0 comments:

Post a Comment

Don't Forget to Share and Comment