Knowledge

ZeroAccess botnet

Source 📝

81:
In December 2013 a coalition led by Microsoft moved to destroy the command and control network for the botnet. The attack was ineffective though because not all C&C were seized, and its peer-to-peer command and control component was unaffected - meaning the botnet could still be updated at will.
77:
in order to have the user click on an advertisement that redirects them to a site hosting the malicious software itself. Finally, a third infection vector used is an affiliate scheme where third-party persons are paid for installing the rootkit on a system.
69:, where a user is persuaded to execute malicious code either by disguising it as a legitimate file, or including it hidden as an additional payload in an executable that announces itself as, for example, bypassing copyright protection (a 102:
for their controller, the estimated worth of which was 2.7 million US dollars per year in September 2012. The machines used for click fraud simulate clicks on website advertisements paid for on a
253: 106:
basis. The estimated profit for this activity may be as high as 100,000 US dollars per day, costing advertisers $ 900,000 a day in fraudulent clicks. Typically, ZeroAccess infects the
58:
estimated the botnet size at around 1 million active and infected machines in the third quarter of 2012, and security firm Kindsight estimated 2.2 million infected and active systems.
524: 339: 872: 892: 54:
responsible for the botnet's spread is estimated to have been present on at least 9 million systems. Estimates botnet size vary across sources; antivirus vendor
261: 484: 370: 584: 114:. It also disables the Windows Security Center, Firewall, and Windows Defender from the operating system. ZeroAccess also hooks itself into the 558: 1506: 1044: 110:(MBR) of the infected machine. It may alternatively infect a random driver in C:\Windows\System32\Drivers giving it total control over the 862: 398: 852: 806: 347: 2311: 1440: 514: 621: 976: 1390: 857: 1524: 1007: 785: 551: 2039: 1530: 1056: 1017: 652: 1590: 1536: 1111: 1002: 831: 1584: 938: 775: 677: 90:
Once a system has been infected with the ZeroAccess rootkit it will start one of the two main botnet operations:
458: 1987: 997: 770: 739: 284: 2331: 877: 790: 589: 579: 544: 140: 66: 1751: 1141: 928: 867: 826: 724: 225: 1488: 1246: 981: 744: 1081: 2306: 1935: 1276: 1131: 923: 816: 760: 682: 1416: 1385: 1012: 145: 971: 206: 188: 2283: 1554: 1121: 1039: 945: 918: 23: 1710: 1374: 847: 780: 626: 1271: 933: 2253: 913: 430: 2077: 2032: 1772: 1725: 1633: 1560: 1344: 708: 955: 811: 2278: 1369: 734: 8: 1859: 887: 703: 74: 1216: 2268: 1997: 1992: 1889: 1518: 1281: 1207: 897: 698: 107: 1220: 729: 34:
operating systems. It is used to download other malware on an infected machine from a
2326: 2316: 2258: 1884: 1854: 1458: 1314: 672: 636: 155: 31: 2321: 2273: 2238: 2025: 1930: 1782: 1705: 1354: 1291: 1166: 615: 111: 1628: 530: 2152: 2142: 2087: 1940: 1915: 1879: 1807: 1720: 1715: 1359: 1151: 1061: 765: 310: 2243: 2222: 2212: 2167: 2157: 2122: 2092: 1679: 1674: 1364: 1349: 1339: 1334: 1266: 1241: 1236: 1231: 1176: 950: 631: 150: 121:
The software also looks for the Tidserv malware and removes it if it finds it.
91: 821: 50:
The ZeroAccess botnet was discovered at least around May 2011. The ZeroAccess
2300: 2248: 2182: 2147: 2137: 2132: 2102: 2072: 1802: 1261: 1212: 103: 2187: 2162: 2107: 1746: 1700: 1500: 1464: 1319: 1309: 1202: 1197: 1192: 1066: 882: 435: 375: 2112: 1982: 1972: 1920: 1828: 1684: 1494: 1324: 1186: 1051: 371:"Microsoft disrupts botnet that generated $ 2.7M per month for operators" 160: 95: 1925: 1910: 1838: 1578: 1482: 1434: 1410: 1398: 1256: 1181: 1171: 1161: 1146: 1106: 1031: 662: 536: 165: 431:"Crooks can milk '$ 100k a day' from 1-million-zombie ZeroAccess army" 2207: 2097: 1956: 1833: 1797: 1787: 1659: 1476: 1226: 1156: 1096: 657: 489: 399:"The ZeroAccess Botnet: Mining and Fraud for Massive Financial Gain" 65:
through a variety of attack vectors. One attack vector is a form of
2177: 2127: 2082: 1864: 1792: 1777: 1596: 1572: 1446: 1428: 1329: 1251: 1086: 1071: 485:"ZeroAccess bot has infected 2 million consumers, firm calculates" 2263: 2117: 1894: 1767: 1730: 1664: 1643: 1613: 1566: 1548: 1470: 1404: 1101: 1091: 1076: 135: 99: 62: 51: 39: 27: 340:"ZeroAccess Botnet Cashing in on Click Fraud and Bitcoin Mining" 2197: 2172: 2048: 1977: 1869: 1823: 1638: 1452: 1422: 1301: 1286: 1116: 667: 518: 406: 315: 230: 130: 115: 70: 55: 35: 2202: 2192: 2067: 1602: 1542: 1512: 1874: 1669: 226:"Over 9 million PCs infected – ZeroAccess botnet uncovered" 2017: 2062: 853:
Hollywood Presbyterian Medical Center ransomware incident
459:"Millions of Home Networks Infected by ZeroAccess Botnet" 16:
Windows-platform based Trojan horse computer malware
2298: 390: 61:The bot itself is spread through the ZeroAccess 893:Russian interference in the 2016 U.S. elections 285:"9 million PCs infected with ZeroAccess botnet" 251: 98:. Machines involved in bitcoin mining generate 217: 2033: 552: 450: 276: 863:Democratic National Committee cyber attacks 422: 2040: 2026: 807:Office of Personnel Management data breach 559: 545: 252:Jackson Higgins, Kelly (30 October 2012). 245: 45: 476: 368: 331: 566: 362: 2299: 428: 337: 207:"Monthly Malware Statistics, May 2011" 183: 181: 73:). A second attack vector utilizes an 2021: 540: 456: 282: 482: 308: 223: 118:stack to help with the click fraud. 858:Commission on Elections data breach 531:New C&C Protocol for ZeroAccess 369:Gallagher, Sean (6 December 2013). 338:Mimoso, Michael (30 October 2012). 178: 13: 429:Leyden, John (24 September 2012). 283:Kumar, Mohit (19 September 2012). 14: 2343: 1018:Jeff Bezos phone hacking incident 515:Analysis of the ZeroAccess botnet 508: 483:Dunn, John E. (2 November 2012). 224:Wyke, James (19 September 2012). 1591:Microarchitectural Data Sampling 827:Ukrainian Power Grid Cyberattack 735:Cyberterrorism attack of June 25 457:Ragan, Steve (31 October 2012). 396: 939:2017 Ukraine ransomware attacks 776:2014 JPMorgan Chase data breach 2312:Distributed computing projects 771:2014 celebrity nude photo leak 302: 199: 1: 1008:Bulgarian revenue agency hack 786:Russian hacker password theft 171: 141:Command and control (malware) 38:while remaining hidden using 1142:Bangladesh Black Hat Hackers 618:(publication of 2009 events) 309:Wyke, James (4 April 2012). 85: 7: 2047: 1003:Baltimore ransomware attack 124: 10: 2348: 1277:Tailored Access Operations 924:WannaCry ransomware attack 817:Ashley Madison data breach 761:Anthem medical data breach 678:PlayStation network outage 533:, Kindsight Security Labs. 527:, Kindsight Security Labs. 254:"ZeroAccess Botnet Surges" 2231: 2055: 1965: 1949: 1903: 1847: 1816: 1760: 1739: 1693: 1652: 1621: 1612: 1383: 1300: 1130: 1030: 1013:WhatsApp snooping scandal 990: 964: 906: 878:Indian Bank data breaches 840: 799: 753: 717: 691: 645: 608: 601: 572: 146:Zombie (computer science) 1555:Speculative Store Bypass 1122:Ukrainian Cyber Alliance 919:2017 Macron e-mail leaks 311:"The ZeroAccess rootkit" 929:Westminster data breach 848:Bangladesh Bank robbery 791:2014 Yahoo! data breach 781:2014 Sony Pictures hack 740:2013 Yahoo! data breach 725:South Korea cyberattack 627:Operation Olympic Games 622:Australian cyberattacks 46:History and propagation 1272:Syrian Electronic Army 982:SingHealth data breach 745:Singapore cyberattacks 683:RSA SecurID compromise 1561:Lazy FP state restore 1345:Kristoffer von Hassel 998:Sri Lanka cyberattack 868:Vietnam Airport Hacks 709:Operation High Roller 2332:Hacking in the 2010s 2279:Operation: Bot Roast 1507:Silent Bob is Silent 567:Hacking in the 2010s 410:. pp. (Page 45) 1441:SS7 vulnerabilities 977:Atlanta cyberattack 946:Equifax data breach 704:Stratfor email leak 653:Canadian government 632:Operation ShadowNet 75:advertising network 2269:Man-in-the-browser 1890:Petya and NotPetya 1519:ROCA vulnerability 1282:The Shadow Brokers 1208:Iranian Cyber Army 1134:persistent threats 934:Petya and NotPetya 898:2016 Bitfinex hack 873:DCCC cyber attacks 832:SWIFT banking hack 350:on 3 December 2012 264:on 3 December 2012 108:Master Boot Record 67:social engineering 2307:Internet security 2292: 2291: 2259:Internet security 2015: 2014: 2011: 2010: 2003:ZeroAccess botnet 1315:Mustafa Al-Bassam 1082:New World Hackers 1045:associated events 1026: 1025: 822:VTech data breach 673:Operation AntiSec 637:Operation Payback 596: 595: 525:ZeroAccess Botnet 156:Internet security 32:Microsoft Windows 2339: 2274:Network security 2239:Browser security 2042: 2035: 2028: 2019: 2018: 1619: 1618: 1292:Yemen Cyber Army 616:Operation Aurora 606: 605: 575: 574: 561: 554: 547: 538: 537: 502: 501: 499: 497: 480: 474: 473: 471: 469: 454: 448: 447: 445: 443: 426: 420: 419: 417: 415: 403: 394: 388: 387: 385: 383: 366: 360: 359: 357: 355: 346:. Archived from 335: 329: 328: 326: 324: 306: 300: 299: 297: 295: 280: 274: 273: 271: 269: 260:. Archived from 249: 243: 242: 240: 238: 221: 215: 214: 203: 197: 196: 193:www.broadcom.com 185: 112:operating system 2347: 2346: 2342: 2341: 2340: 2338: 2337: 2336: 2297: 2296: 2293: 2288: 2227: 2056:Notable botnets 2051: 2046: 2016: 2007: 1961: 1945: 1899: 1843: 1812: 1756: 1735: 1689: 1648: 1608: 1388: 1386:vulnerabilities 1379: 1296: 1189:(confederation) 1152:Charming Kitten 1133: 1126: 1062:Goatse Security 1022: 986: 960: 951:Deloitte breach 902: 888:Dyn cyberattack 836: 795: 766:Operation Tovar 749: 713: 687: 641: 602:Major incidents 597: 568: 565: 511: 506: 505: 495: 493: 481: 477: 467: 465: 455: 451: 441: 439: 427: 423: 413: 411: 401: 395: 391: 381: 379: 367: 363: 353: 351: 336: 332: 322: 320: 307: 303: 293: 291: 289:The Hacker News 281: 277: 267: 265: 250: 246: 236: 234: 222: 218: 205: 204: 200: 189:"Risk Detected" 187: 186: 179: 174: 127: 88: 48: 17: 12: 11: 5: 2345: 2335: 2334: 2329: 2324: 2319: 2314: 2309: 2290: 2289: 2287: 2286: 2281: 2276: 2271: 2266: 2261: 2256: 2251: 2246: 2244:Computer virus 2241: 2235: 2233: 2229: 2228: 2226: 2225: 2220: 2215: 2210: 2205: 2200: 2195: 2190: 2185: 2180: 2175: 2170: 2165: 2160: 2155: 2150: 2145: 2140: 2135: 2130: 2125: 2120: 2115: 2110: 2105: 2100: 2095: 2090: 2085: 2080: 2075: 2070: 2065: 2059: 2057: 2053: 2052: 2045: 2044: 2037: 2030: 2022: 2013: 2012: 2009: 2008: 2006: 2005: 2000: 1995: 1990: 1985: 1980: 1975: 1969: 1967: 1963: 1962: 1960: 1959: 1953: 1951: 1947: 1946: 1944: 1943: 1938: 1933: 1928: 1923: 1918: 1913: 1907: 1905: 1901: 1900: 1898: 1897: 1892: 1887: 1882: 1877: 1872: 1867: 1862: 1857: 1851: 1849: 1845: 1844: 1842: 1841: 1836: 1831: 1826: 1820: 1818: 1814: 1813: 1811: 1810: 1805: 1800: 1795: 1790: 1785: 1780: 1775: 1773:Black Energy 3 1770: 1764: 1762: 1758: 1757: 1755: 1754: 1749: 1743: 1741: 1737: 1736: 1734: 1733: 1728: 1723: 1718: 1713: 1708: 1703: 1697: 1695: 1691: 1690: 1688: 1687: 1682: 1680:Metulji botnet 1677: 1672: 1667: 1662: 1656: 1654: 1650: 1649: 1647: 1646: 1641: 1636: 1634:Black Energy 2 1631: 1625: 1623: 1616: 1610: 1609: 1607: 1606: 1600: 1594: 1588: 1582: 1576: 1570: 1564: 1558: 1552: 1546: 1540: 1534: 1528: 1522: 1516: 1510: 1504: 1498: 1492: 1489:Broadcom Wi-Fi 1486: 1480: 1474: 1468: 1462: 1456: 1450: 1444: 1438: 1432: 1426: 1420: 1414: 1408: 1402: 1395: 1393: 1381: 1380: 1378: 1377: 1372: 1367: 1362: 1357: 1352: 1350:Junaid Hussain 1347: 1342: 1340:Jeremy Hammond 1337: 1335:Elliott Gunton 1332: 1327: 1322: 1317: 1312: 1306: 1304: 1298: 1297: 1295: 1294: 1289: 1284: 1279: 1274: 1269: 1267:Stealth Falcon 1264: 1259: 1254: 1249: 1244: 1242:PLA Unit 61486 1239: 1237:PLA Unit 61398 1234: 1232:Numbered Panda 1229: 1224: 1210: 1205: 1200: 1195: 1190: 1184: 1179: 1177:Equation Group 1174: 1169: 1164: 1159: 1154: 1149: 1144: 1138: 1136: 1128: 1127: 1125: 1124: 1119: 1114: 1109: 1104: 1099: 1094: 1089: 1084: 1079: 1074: 1069: 1064: 1059: 1054: 1049: 1048: 1047: 1036: 1034: 1028: 1027: 1024: 1023: 1021: 1020: 1015: 1010: 1005: 1000: 994: 992: 988: 987: 985: 984: 979: 974: 968: 966: 962: 961: 959: 958: 953: 948: 943: 942: 941: 931: 926: 921: 916: 910: 908: 904: 903: 901: 900: 895: 890: 885: 880: 875: 870: 865: 860: 855: 850: 844: 842: 838: 837: 835: 834: 829: 824: 819: 814: 809: 803: 801: 797: 796: 794: 793: 788: 783: 778: 773: 768: 763: 757: 755: 751: 750: 748: 747: 742: 737: 732: 727: 721: 719: 715: 714: 712: 711: 706: 701: 695: 693: 689: 688: 686: 685: 680: 675: 670: 668:HBGary Federal 665: 660: 655: 649: 647: 643: 642: 640: 639: 634: 629: 624: 619: 612: 610: 603: 599: 598: 594: 593: 587: 582: 573: 570: 569: 564: 563: 556: 549: 541: 535: 534: 528: 522: 510: 509:External links 507: 504: 503: 475: 449: 421: 389: 361: 330: 301: 275: 244: 216: 211:securelist.com 198: 176: 175: 173: 170: 169: 168: 163: 158: 153: 151:Internet crime 148: 143: 138: 133: 126: 123: 92:bitcoin mining 87: 84: 47: 44: 15: 9: 6: 4: 3: 2: 2344: 2333: 2330: 2328: 2325: 2323: 2320: 2318: 2315: 2313: 2310: 2308: 2305: 2304: 2302: 2295: 2285: 2282: 2280: 2277: 2275: 2272: 2270: 2267: 2265: 2262: 2260: 2257: 2255: 2252: 2250: 2249:Computer worm 2247: 2245: 2242: 2240: 2237: 2236: 2234: 2232:Main articles 2230: 2224: 2221: 2219: 2216: 2214: 2211: 2209: 2206: 2204: 2201: 2199: 2196: 2194: 2191: 2189: 2186: 2184: 2181: 2179: 2176: 2174: 2171: 2169: 2166: 2164: 2161: 2159: 2156: 2154: 2151: 2149: 2146: 2144: 2141: 2139: 2136: 2134: 2131: 2129: 2126: 2124: 2121: 2119: 2116: 2114: 2111: 2109: 2106: 2104: 2101: 2099: 2096: 2094: 2091: 2089: 2086: 2084: 2081: 2079: 2076: 2074: 2071: 2069: 2066: 2064: 2061: 2060: 2058: 2054: 2050: 2043: 2038: 2036: 2031: 2029: 2024: 2023: 2020: 2004: 2001: 1999: 1996: 1994: 1991: 1989: 1986: 1984: 1981: 1979: 1976: 1974: 1971: 1970: 1968: 1964: 1958: 1955: 1954: 1952: 1948: 1942: 1939: 1937: 1934: 1932: 1929: 1927: 1924: 1922: 1919: 1917: 1914: 1912: 1909: 1908: 1906: 1902: 1896: 1893: 1891: 1888: 1886: 1883: 1881: 1878: 1876: 1873: 1871: 1868: 1866: 1863: 1861: 1858: 1856: 1853: 1852: 1850: 1846: 1840: 1837: 1835: 1832: 1830: 1827: 1825: 1822: 1821: 1819: 1815: 1809: 1806: 1804: 1803:Gameover ZeuS 1801: 1799: 1796: 1794: 1791: 1789: 1786: 1784: 1781: 1779: 1776: 1774: 1771: 1769: 1766: 1765: 1763: 1759: 1753: 1750: 1748: 1745: 1744: 1742: 1738: 1732: 1729: 1727: 1724: 1722: 1719: 1717: 1714: 1712: 1709: 1707: 1704: 1702: 1699: 1698: 1696: 1692: 1686: 1683: 1681: 1678: 1676: 1673: 1671: 1668: 1666: 1663: 1661: 1658: 1657: 1655: 1651: 1645: 1642: 1640: 1637: 1635: 1632: 1630: 1627: 1626: 1624: 1620: 1617: 1615: 1611: 1604: 1601: 1598: 1595: 1592: 1589: 1586: 1583: 1580: 1577: 1574: 1571: 1568: 1565: 1562: 1559: 1556: 1553: 1550: 1547: 1544: 1541: 1538: 1535: 1532: 1529: 1526: 1523: 1520: 1517: 1514: 1511: 1508: 1505: 1502: 1499: 1496: 1493: 1490: 1487: 1484: 1481: 1478: 1475: 1472: 1469: 1466: 1463: 1460: 1457: 1454: 1451: 1448: 1445: 1442: 1439: 1436: 1433: 1430: 1427: 1424: 1421: 1418: 1415: 1412: 1409: 1406: 1403: 1400: 1397: 1396: 1394: 1392: 1387: 1382: 1376: 1373: 1371: 1368: 1366: 1363: 1361: 1358: 1356: 1353: 1351: 1348: 1346: 1343: 1341: 1338: 1336: 1333: 1331: 1328: 1326: 1323: 1321: 1318: 1316: 1313: 1311: 1308: 1307: 1305: 1303: 1299: 1293: 1290: 1288: 1285: 1283: 1280: 1278: 1275: 1273: 1270: 1268: 1265: 1263: 1262:Rocket Kitten 1260: 1258: 1255: 1253: 1250: 1248: 1245: 1243: 1240: 1238: 1235: 1233: 1230: 1228: 1225: 1222: 1218: 1214: 1213:Lazarus Group 1211: 1209: 1206: 1204: 1201: 1199: 1196: 1194: 1191: 1188: 1185: 1183: 1180: 1178: 1175: 1173: 1170: 1168: 1165: 1163: 1160: 1158: 1155: 1153: 1150: 1148: 1145: 1143: 1140: 1139: 1137: 1135: 1129: 1123: 1120: 1118: 1115: 1113: 1110: 1108: 1105: 1103: 1100: 1098: 1095: 1093: 1090: 1088: 1085: 1083: 1080: 1078: 1075: 1073: 1070: 1068: 1065: 1063: 1060: 1058: 1055: 1053: 1050: 1046: 1043: 1042: 1041: 1038: 1037: 1035: 1033: 1029: 1019: 1016: 1014: 1011: 1009: 1006: 1004: 1001: 999: 996: 995: 993: 989: 983: 980: 978: 975: 973: 970: 969: 967: 963: 957: 956:Disqus breach 954: 952: 949: 947: 944: 940: 937: 936: 935: 932: 930: 927: 925: 922: 920: 917: 915: 912: 911: 909: 905: 899: 896: 894: 891: 889: 886: 884: 881: 879: 876: 874: 871: 869: 866: 864: 861: 859: 856: 854: 851: 849: 846: 845: 843: 839: 833: 830: 828: 825: 823: 820: 818: 815: 813: 810: 808: 805: 804: 802: 798: 792: 789: 787: 784: 782: 779: 777: 774: 772: 769: 767: 764: 762: 759: 758: 756: 752: 746: 743: 741: 738: 736: 733: 731: 730:Snapchat hack 728: 726: 723: 722: 720: 716: 710: 707: 705: 702: 700: 699:LinkedIn hack 697: 696: 694: 690: 684: 681: 679: 676: 674: 671: 669: 666: 664: 661: 659: 656: 654: 651: 650: 648: 644: 638: 635: 633: 630: 628: 625: 623: 620: 617: 614: 613: 611: 607: 604: 600: 592: → 591: 588: 586: 583: 581: 578:←  577: 576: 571: 562: 557: 555: 550: 548: 543: 542: 539: 532: 529: 526: 523: 520: 517:, created by 516: 513: 512: 492: 491: 486: 479: 464: 460: 453: 438: 437: 432: 425: 409: 408: 400: 397:Wyke, James. 393: 378: 377: 372: 365: 349: 345: 341: 334: 318: 317: 312: 305: 290: 286: 279: 263: 259: 255: 248: 233: 232: 227: 220: 212: 208: 202: 194: 190: 184: 182: 177: 167: 164: 162: 159: 157: 154: 152: 149: 147: 144: 142: 139: 137: 134: 132: 129: 128: 122: 119: 117: 113: 109: 105: 104:pay per click 101: 97: 93: 83: 79: 76: 72: 68: 64: 59: 57: 53: 43: 41: 37: 33: 30:that affects 29: 25: 21: 2294: 2284:Trojan horse 2217: 2002: 1747:CryptoLocker 1501:DoublePulsar 1320:Cyber Anakin 1310:Ryan Ackroyd 1203:Helix Kitten 1198:Hacking Team 1193:Guccifer 2.0 1067:Lizard Squad 883:Surkov leaks 812:Hacking Team 494:. Retrieved 488: 478: 466:. Retrieved 463:SecurityWeek 462: 452: 440:. Retrieved 436:The Register 434: 424: 412:. Retrieved 405: 392: 380:. Retrieved 376:Ars Technica 374: 364: 352:. Retrieved 348:the original 343: 333: 321:. Retrieved 314: 304: 292:. Retrieved 288: 278: 266:. Retrieved 262:the original 258:Dark Reading 257: 247: 235:. Retrieved 229: 219: 210: 201: 192: 120: 89: 80: 60: 49: 42:techniques. 24:Trojan horse 19: 18: 1983:NetTraveler 1921:LogicLocker 1829:Hidden Tear 1726:Red October 1585:Dragonblood 1495:EternalBlue 1459:Stagefright 1325:George Hotz 1302:Individuals 1052:CyberBerkut 496:27 December 468:27 December 442:27 December 414:27 December 354:27 December 323:27 December 319:. p. 2 294:27 December 268:27 December 237:27 December 161:Click fraud 96:click fraud 2301:Categories 2218:ZeroAccess 1926:Rensenware 1911:BrickerBot 1839:TeslaCrypt 1629:Bad Rabbit 1579:Foreshadow 1483:Cloudbleed 1435:Row hammer 1417:Shellshock 1411:Heartbleed 1399:Evercookie 1375:The Jester 1257:Red Apollo 1217:BlueNorOff 1187:GOSSIPGIRL 1182:Fancy Bear 1172:Elfin Team 1167:DarkMatter 1162:Dark Basin 1147:Bureau 121 1107:Teamp0ison 1032:Hacktivism 663:DNSChanger 382:9 December 344:ThreatPost 172:References 166:Clickbot.A 20:ZeroAccess 2208:Vulcanbot 2098:Conficker 1957:VPNFilter 1834:Rombertik 1798:FinFisher 1788:DarkHotel 1752:DarkSeoul 1660:Coreflood 1525:BlueBorne 1477:Dirty COW 1391:disclosed 1389:publicly 1227:NSO Group 1157:Cozy Bear 1097:PayPal 14 1040:Anonymous 914:SHAttered 658:DigiNotar 490:Techworld 86:Operation 26:computer 2327:Rootkits 2317:Spamming 2178:Slenfbot 2143:Mariposa 2128:Koobface 2088:Bredolab 2083:BASHLITE 1998:Titanium 1941:XafeCopy 1936:WannaCry 1865:KeRanger 1793:Duqu 2.0 1778:Carbanak 1597:BlueKeep 1573:SigSpoof 1531:Meltdown 1447:WinShock 1429:Rootpipe 1330:Guccifer 1252:Pranknet 1247:PLATINUM 1221:AndAriel 1132:Advanced 1087:NullCrew 1072:LulzRaft 972:Trustico 585:Timeline 125:See also 100:bitcoins 2322:Botnets 2264:Malware 2213:Waledac 2168:Rustock 2158:Metulji 2123:Kelihos 2118:Gumblar 2093:Cutwail 2049:Botnets 1895:X-Agent 1885:Pegasus 1768:Brambul 1731:Shamoon 1675:Kelihos 1665:Alureon 1644:Stuxnet 1614:Malware 1567:TLBleed 1549:Exactis 1537:Spectre 1471:Badlock 1405:iSeeYou 1370:Topiary 1102:RedHack 1092:OurMine 1077:LulzSec 136:Malware 63:rootkit 52:rootkit 40:rootkit 28:malware 2254:Malbot 2198:Torpig 2183:Srizbi 2173:Sality 2148:Mega-D 2138:Lethic 2133:Kraken 2103:Donbot 2073:Asprox 1978:Joanap 1931:Triton 1870:Necurs 1860:Jigsaw 1855:Hitler 1824:Dridex 1783:Careto 1706:Dexter 1639:SpyEye 1605:(2019) 1599:(2019) 1593:(2019) 1587:(2019) 1581:(2018) 1575:(2018) 1569:(2018) 1563:(2018) 1557:(2018) 1551:(2018) 1545:(2018) 1539:(2018) 1533:(2018) 1527:(2017) 1521:(2017) 1515:(2017) 1509:(2017) 1503:(2017) 1497:(2017) 1491:(2017) 1485:(2017) 1479:(2016) 1473:(2016) 1467:(2016) 1461:(2015) 1455:(2015) 1453:JASBUG 1449:(2014) 1443:(2014) 1437:(2014) 1431:(2014) 1425:(2014) 1423:POODLE 1419:(2014) 1413:(2014) 1407:(2013) 1401:(2010) 1384:Major 1365:Track2 1287:xDedic 1117:UGNazi 519:Sophos 407:Sophos 316:Sophos 231:Sophos 131:Botnet 116:TCP/IP 71:keygen 56:Sophos 36:botnet 2203:Virut 2193:TDL-4 2188:Storm 2163:Nitol 2153:Mirai 2108:Festi 2078:Bagle 2068:Akbot 1993:Tinba 1880:Mirai 1808:Regin 1721:Mahdi 1716:Flame 1701:Carna 1685:Stars 1603:Kr00k 1543:EFAIL 1513:KRACK 1465:DROWN 590:2020s 580:2000s 402:(PDF) 22:is a 2223:Zeus 2113:Grum 1988:R2D2 1973:Grum 1966:2019 1950:2018 1916:Kirk 1904:2017 1875:MEMZ 1848:2016 1817:2015 1761:2014 1740:2013 1694:2012 1670:Duqu 1653:2011 1622:2010 1360:Sabu 1112:TDO 1057:GNAA 991:2019 965:2018 907:2017 841:2016 800:2015 754:2014 718:2013 692:2012 646:2011 609:2010 498:2012 470:2012 444:2012 416:2012 384:2013 356:2012 325:2012 296:2012 270:2012 239:2012 2063:3ve 1711:FBI 1355:MLT 1219:) ( 94:or 2303:: 487:. 461:. 433:. 404:. 373:. 342:. 313:. 287:. 256:. 228:. 209:. 191:. 180:^ 2041:e 2034:t 2027:v 1223:) 1215:( 560:e 553:t 546:v 521:. 500:. 472:. 446:. 418:. 386:. 358:. 327:. 298:. 272:. 241:. 213:. 195:.

Index

Trojan horse
malware
Microsoft Windows
botnet
rootkit
rootkit
Sophos
rootkit
social engineering
keygen
advertising network
bitcoin mining
click fraud
bitcoins
pay per click
Master Boot Record
operating system
TCP/IP
Botnet
Malware
Command and control (malware)
Zombie (computer science)
Internet crime
Internet security
Click fraud
Clickbot.A


"Risk Detected"
"Monthly Malware Statistics, May 2011"

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.