• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Search results for: botnet takedown

Esthost Taken Down – Biggest Cybercriminal Takedown in History

  • Posted on:November 9, 2011 at 12:29 pm
  • Posted in:Exploits
  • Author:
    Feike Hacquebord (Senior Threat Researcher)
62

On November 8, a long-living botnet of more than 4,000,000 bots was taken down by the FBI and Estonian police in cooperation with Trend Micro and a number of other industry partners. In this operation, dubbed “Operation Ghost Click” by the FBI, two data centers in New York City and Chicago were raided and a…

Read More

A Win for the Good Guys: The CoreFlood Takedown

  • Posted on:April 14, 2011 at 5:46 am
  • Posted in:Bad Sites
  • Author:
    David Sancho (Senior Threat Researcher)
10

It’s botnet takedown season again and this time around, CoreFlood bit the dust. As is most often the case nowadays, this botnet was exclusively built to steal its victims’ personal and financial information. The takedown was facilitated by the U.S. Department of Justice and by the Federal Bureau of Investigation (FBI). This is a great…

Read More

New Fake Facebook Spam Waves Sent Through Cutwail/Pushdo Botnet

  • Posted on:September 8, 2010 at 2:09 pm
  • Posted in:Botnets
  • Author:
    Loucif Kharouni (Senior Threat Researcher)
1

Who said that Cutwail/Pushdo botnet is dead? The recent Cutwail/Pushdo takedown was a great help in stopping this huge botnet in sending out spammed messages all over the world. Yesterday, however, a new wave of approximately 5,000 fake Facebook messages was sent through some Cutwail zombies for about 30 minutes. The spammed message informs users…

Read More

New KOOBFACE Upgrade Makes It Takedown-Proof

  • Posted on:July 22, 2009 at 7:51 am
  • Posted in:Bad Sites, Botnets, Malware
  • Author:
    Jonell Baltazar (Senior Threat Researcher)
12

Early this week, the KOOBFACE Command and Control (C&C) servers issued a new command to its downloader component. This new command identifies a list of IP addresses to be used by the downloader component as Web or relay proxies to retrieve subsequent commands and components. In the old KOOBFACE architecture (see Figure 1), the downloader…

Read More

The Long Arm of the Law: Multiple Cybercriminals Sent Behind Bars

  • Posted on:May 2, 2016 at 2:07 pm
  • Posted in:Malware
  • Author:
    Martin Roesler (Director, Threat Research)
0

April 2016 was a great month for putting cybercriminals in prison. On April 12 Paunch, the creator of the infamous Blackhole exploit kit, was sentenced to seven years in a Russian prison. This was soon followed by Aleksandr Panin, the creator of SpyEye: he was sentenced by a United States federal court to nine and a half years in prison for his role in creating SpyEye. One of his partners, Hamza Bendelladj, was sentenced to fifteen years.

The most recent case involved Esthost, a company we know very well from our research. Vladimir Tsastsin became the latest member of the Esthost gang to be sentenced to jail; he will spend more than 7 years in prison. He was also ordered to forfeit more than $2.5 million in property.

Read More
Tags: arrestscybercrimelaw enforcement
Page 2 of 10 ‹ 123 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.