NASK shuts down dangerous Virut botnet domains
Jump to navigation
Jump to search
(Publication) Google search: [1]
NASK shuts down dangerous Virut botnet domains | |
---|---|
Botnet | Virut |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2013 / 2013-01-18 |
Editor/Conference | CERT Polska |
Link | https://www.cert.pl/news/6666/langswitch lang/en (Archive copy) |
Author | |
Type | Blogpost |
Abstract
“ NASK has taken over multiple domains used for cybercrime activities, making their further usage for illegal purposes impossible. The domain names were used to spread and control dangerous malware known as “Virut” . NASK’s actions are aimed at protecting Internet users from threats that involved the botnet built with Virut-infected machines, such as DDoS attacks, spam and data theft. The scale of the phenomenon was massive: in 2012 for Poland alone, over 890 thousand unique IP addresses were reported to be infected by Virut.
Bibtex
@misc{empty2013BFR1284,
editor = {CERT Polska},
author = {},
title = {NASK shuts down dangerous Virut botnet domains},
date = {18},
month = Jan,
year = {2013},
howpublished = {\url{https://www.cert.pl/news/6666/langswitch_lang/en}},
}