Difference between revisions of "Top spam botnets exposed"

From Botnets.fr
Jump to navigation Jump to search
 
m (Text replacement - "/ www." to "/ |Site=www.")
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
{{Publication
{{Publication
|Link=http://www.secureworks.com/cyber-threat-intelligence/threats/topbotnets/ www.secureworks.com
|Link=http://www.secureworks.com/cyber-threat-intelligence/threats/topbotnets/
|Site=www.secureworks.com
|Author=Joe Stewart
|Author=Joe Stewart
|NomRevue=DELL SecureWorks Threat Analyses
|NomRevue=DELL SecureWorks Threat Analyses

Latest revision as of 12:56, 31 July 2015

(Publication) Google search: [1]

Top spam botnets exposed
Botnet Srizbi, Storm, Bobax, Ozdok, Rustock, Cutwail, Grum, OneWordSub, Wopla, SpamThru
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2008 / 2008-04-08
Editor/Conference DELL SecureWorks
Link http://www.secureworks.com/cyber-threat-intelligence/threats/topbotnets/ (Archive copy)
Author Joe Stewart
Type

Abstract

* Collectively the top botnets are capable of sending over 100 billion spams per day

  • Srizbi maintains the top spot both in terms of number of bots and spamming capacity
  • Storm is only a fraction of its former self, and is rapidly becoming a minor player
  • Bobax, probably the longest-lived of the template-based spamming botnets is still around, and ranks #2 in number of bots
  • Ozdok/Mega-D is still relatively small in numbers, but makes up for its diminutive size with aggressive amounts of spam sent per bot

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2008BFR1216,
   editor = {DELL SecureWorks},
   author = {Joe Stewart},
   title = {Top spam botnets exposed},
   date = {08},
   month = Apr,
   year = {2008},
   howpublished = {\url{http://www.secureworks.com/cyber-threat-intelligence/threats/topbotnets/}},
 }