Bredolab botmaster ‘Birdie’ still at large

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

Bredolab botmaster ‘Birdie’ still at large
Bredolab botmaster birdie still at large.png
Botnet Bredolab
Malware Zbot
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / March 21 2012
Editor/Conference Krebs on Security
Link http://krebsonsecurity.com/2012/03/bredolab-botmaster-birdie-still-at-large/ (Archive copy)
Author Brian Krebs
Type

Abstract

Employee and financial records leaked from some of the world’s largest sponsors of spam provide new clues about the identity of a previously unknown Russian man believed to have been closely tied to the development and maintenance of “Bredolab,” a massive collection of hacked machines that was disassembled in an international law enforcement sweep in late 2010.


Bredolab's grew swiftly after Birdie introduced his load system. In October 2010, Armenian authorities arrested and imprisoned 27-year-old Georg Avanesov on suspicion of running Bredolab, a botnet that infected an estimated 3 million PCs per month through virus-laden e-mails and booby-trapped Web sites. The arrest resulted from a joint investigation between Armenian police and cyber sleuths in the Netherlands, whose ISPs were home to at least 143 servers that were used to direct the botnet’s activities.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR950,
   editor = {Krebs on Security},
   author = {Brian Krebs},
   title = {Bredolab botmaster ‘Birdie’ still at large},
   date = {21},
   month = Mar,
   year = {2012},
   howpublished = {\url{http://krebsonsecurity.com/2012/03/bredolab-botmaster-birdie-still-at-large/}},
 }