• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Search results for: botnet takedown

SIMDA: A Botnet Takedown

  • Posted on:April 12, 2015 at 11:03 pm
  • Posted in:Botnets
  • Author:
    Trend Micro
0

The collaboration between Trend Micro, INTERPOL, Microsoft, Kaspersky Lab, and the Cyber Defense Institute resulted in a triumph for the security industry earlier this week: the takedown of the SIMDA botnet. Trend Micro provided information such as the IP addresses of the affiliated servers and statistical information about the malware used, which led to the disruption of…

Read More
Tags: botnetlaw enforcementMalwareSIMDAtakedown

Pushdo Takedown Damages Botnet

  • Posted on:September 2, 2010 at 4:40 am
  • Posted in:Botnets, Spam
  • Author:
    Loucif Kharouni (Senior Threat Researcher)
1

Last week it was reported that the Pushdo botnet, used to send spam using the Cutwail spamming module, was taken down, thanks to the efforts of several security researchers. Thirty command-and-control (C&C) servers of the Pushdo/Cutwail botnet were identified, almost 20 of which were taken down after their Internet hosting providers were notified. So far,…

Read More

QAKBOT Resurges: Despite Takedowns, Online Banking Threats Persist

  • Posted on:February 18, 2016 at 6:39 am
  • Posted in:Malware
  • Author:
    Cklaudioney Mesa (Threat Response Engineer) and Christopher Ordonez (Threat Response Engineer)
0

While takedowns and/or arrests slow down or severely damage cybercriminal operations, they could also pave the way for other threat actors to up their ante when it comes to their nefarious activities and “battle” it out to fill the void left by those who said operations were hampered. Regardless who emerges the victor, in the end, it’s still the users and organizations that fall victim to these attacks who lose.

Read More

FBI, Security Vendors Partner for DRIDEX Takedown

  • Posted on:October 13, 2015 at 2:44 pm
  • Posted in:Malware
  • Author:
    Trend Micro
0

Multiple command-and-control (C&C) servers used by the DRIDEX botnet have been taken down by the Federal Bureau of Investigation (FBI), following the action taken by the National Crime Agency (NCA) in the UK.

US law enforcement officials obtained court orders that resulted in the seizure of multiple servers used by DRIDEX. This crippled the malware’s C&C network, which is used by the malware to send the stolen information to the cybercriminals and to download configuration files that include the list of targeted banks. Furthermore, charges have been made against Andrey Ghinkul, aka Andrei Ghincul and Smilex, the Moldovan administrator of the botnet.

Read More
Tags: C&CDRIDEXlaw enforcementMalwareonline bankingtakedown

ZeroAccess Takedown and the TDSS Aftermath

  • Posted on:January 8, 2014 at 1:35 pm
  • Posted in:Malware
  • Author:
    Yuki Hsu (Senior Engineer)
0

Early December last year, Microsoft –  in cooperation with certain law enforcement agencies –  announced their takedown of the ZeroAccess operations. However, this also unexpectedly affected another well-known botnet, TDSS. TDSS and ZeroAccess ZeroAccess is one of the most notable botnets in the world, with its malware known for rootkit capability. This malware is typically downloaded…

Read More
Tags: botnetclick fraudtakedownTDSSzaccesszeroaccess
Page 1 of 1012 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.