Difference between revisions of "NASK shuts down dangerous Virut botnet domains"
Jump to navigation
Jump to search
m (1 revision imported) |
m (Text replacement - " www.cert.pl" to "") |
||
Line 1: | Line 1: | ||
{{Publication | {{Publication | ||
|Type=Blogpost | |Type=Blogpost | ||
|Link=https://www.cert.pl/news/6666/langswitch_lang/en | |Link=https://www.cert.pl/news/6666/langswitch_lang/en | ||
|NomRevue=CERT Polska Blog | |NomRevue=CERT Polska Blog | ||
|Date=2013-01-18 | |Date=2013-01-18 |
Latest revision as of 21:52, 5 August 2015
(Publication) Google search: [1]
NASK shuts down dangerous Virut botnet domains | |
---|---|
Botnet | Virut |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2013 / 2013-01-18 |
Editor/Conference | CERT Polska |
Link | https://www.cert.pl/news/6666/langswitch lang/en (Archive copy) |
Author | |
Type | Blogpost |
Abstract
“ NASK has taken over multiple domains used for cybercrime activities, making their further usage for illegal purposes impossible. The domain names were used to spread and control dangerous malware known as “Virut” . NASK’s actions are aimed at protecting Internet users from threats that involved the botnet built with Virut-infected machines, such as DDoS attacks, spam and data theft. The scale of the phenomenon was massive: in 2012 for Poland alone, over 890 thousand unique IP addresses were reported to be infected by Virut.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1284, editor = {CERT Polska}, author = {}, title = {NASK shuts down dangerous Virut botnet domains}, date = {18}, month = Jan, year = {2013}, howpublished = {\url{https://www.cert.pl/news/6666/langswitch_lang/en}}, }