81:
In
December 2013 a coalition led by Microsoft moved to destroy the command and control network for the botnet. The attack was ineffective though because not all C&C were seized, and its peer-to-peer command and control component was unaffected - meaning the botnet could still be updated at will.
77:
in order to have the user click on an advertisement that redirects them to a site hosting the malicious software itself. Finally, a third infection vector used is an affiliate scheme where third-party persons are paid for installing the rootkit on a system.
69:, where a user is persuaded to execute malicious code either by disguising it as a legitimate file, or including it hidden as an additional payload in an executable that announces itself as, for example, bypassing copyright protection (a
102:
for their controller, the estimated worth of which was 2.7 million US dollars per year in
September 2012. The machines used for click fraud simulate clicks on website advertisements paid for on a
253:
106:
basis. The estimated profit for this activity may be as high as 100,000 US dollars per day, costing advertisers $ 900,000 a day in fraudulent clicks. Typically, ZeroAccess infects the
58:
estimated the botnet size at around 1 million active and infected machines in the third quarter of 2012, and security firm
Kindsight estimated 2.2 million infected and active systems.
524:
339:
872:
892:
54:
responsible for the botnet's spread is estimated to have been present on at least 9 million systems. Estimates botnet size vary across sources; antivirus vendor
261:
484:
370:
584:
114:. It also disables the Windows Security Center, Firewall, and Windows Defender from the operating system. ZeroAccess also hooks itself into the
558:
1506:
1044:
110:(MBR) of the infected machine. It may alternatively infect a random driver in C:\Windows\System32\Drivers giving it total control over the
862:
398:
852:
806:
347:
2311:
1440:
514:
621:
976:
1390:
857:
1524:
1007:
785:
551:
2039:
1530:
1056:
1017:
652:
1590:
1536:
1111:
1002:
831:
1584:
938:
775:
677:
90:
Once a system has been infected with the ZeroAccess rootkit it will start one of the two main botnet operations:
458:
1987:
997:
770:
739:
284:
2331:
877:
790:
589:
579:
544:
140:
66:
1751:
1141:
928:
867:
826:
724:
225:
1488:
1246:
981:
744:
1081:
2306:
1935:
1276:
1131:
923:
816:
760:
682:
1416:
1385:
1012:
145:
971:
206:
188:
2283:
1554:
1121:
1039:
945:
918:
23:
1710:
1374:
847:
780:
626:
1271:
933:
2253:
913:
430:
2077:
2032:
1772:
1725:
1633:
1560:
1344:
708:
955:
811:
2278:
1369:
734:
8:
1859:
887:
703:
74:
1216:
2268:
1997:
1992:
1889:
1518:
1281:
1207:
897:
698:
107:
1220:
729:
34:
operating systems. It is used to download other malware on an infected machine from a
2326:
2316:
2258:
1884:
1854:
1458:
1314:
672:
636:
155:
31:
2321:
2273:
2238:
2025:
1930:
1782:
1705:
1354:
1291:
1166:
615:
111:
1628:
530:
2152:
2142:
2087:
1940:
1915:
1879:
1807:
1720:
1715:
1359:
1151:
1061:
765:
310:
2243:
2222:
2212:
2167:
2157:
2122:
2092:
1679:
1674:
1364:
1349:
1339:
1334:
1266:
1241:
1236:
1231:
1176:
950:
631:
150:
121:
The software also looks for the
Tidserv malware and removes it if it finds it.
91:
821:
50:
The ZeroAccess botnet was discovered at least around May 2011. The ZeroAccess
2300:
2248:
2182:
2147:
2137:
2132:
2102:
2072:
1802:
1261:
1212:
103:
2187:
2162:
2107:
1746:
1700:
1500:
1464:
1319:
1309:
1202:
1197:
1192:
1066:
882:
435:
375:
2112:
1982:
1972:
1920:
1828:
1684:
1494:
1324:
1186:
1051:
371:"Microsoft disrupts botnet that generated $ 2.7M per month for operators"
160:
95:
1925:
1910:
1838:
1578:
1482:
1434:
1410:
1398:
1256:
1181:
1171:
1161:
1146:
1106:
1031:
662:
536:
165:
431:"Crooks can milk '$ 100k a day' from 1-million-zombie ZeroAccess army"
2207:
2097:
1956:
1833:
1797:
1787:
1659:
1476:
1226:
1156:
1096:
657:
489:
399:"The ZeroAccess Botnet: Mining and Fraud for Massive Financial Gain"
65:
through a variety of attack vectors. One attack vector is a form of
2177:
2127:
2082:
1864:
1792:
1777:
1596:
1572:
1446:
1428:
1329:
1251:
1086:
1071:
485:"ZeroAccess bot has infected 2 million consumers, firm calculates"
2263:
2117:
1894:
1767:
1730:
1664:
1643:
1613:
1566:
1548:
1470:
1404:
1101:
1091:
1076:
135:
99:
62:
51:
39:
27:
340:"ZeroAccess Botnet Cashing in on Click Fraud and Bitcoin Mining"
2197:
2172:
2048:
1977:
1869:
1823:
1638:
1452:
1422:
1301:
1286:
1116:
667:
518:
406:
315:
230:
130:
115:
70:
55:
35:
2202:
2192:
2067:
1602:
1542:
1512:
1874:
1669:
226:"Over 9 million PCs infected – ZeroAccess botnet uncovered"
2017:
2062:
853:
459:"Millions of Home Networks Infected by ZeroAccess Botnet"
16:
Windows-platform based Trojan horse computer malware
2298:
390:
61:The bot itself is spread through the ZeroAccess
893:Russian interference in the 2016 U.S. elections
285:"9 million PCs infected with ZeroAccess botnet"
251:
98:. Machines involved in bitcoin mining generate
217:
2033:
552:
450:
276:
863:Democratic National Committee cyber attacks
422:
2040:
2026:
807:Office of Personnel Management data breach
559:
545:
252:Jackson Higgins, Kelly (30 October 2012).
245:
45:
476:
368:
331:
566:
362:
2299:
428:
337:
207:"Monthly Malware Statistics, May 2011"
183:
181:
73:). A second attack vector utilizes an
2021:
540:
456:
282:
482:
308:
223:
118:stack to help with the click fraud.
858:Commission on Elections data breach
531:New C&C Protocol for ZeroAccess
369:Gallagher, Sean (6 December 2013).
338:Mimoso, Michael (30 October 2012).
178:
13:
429:Leyden, John (24 September 2012).
283:Kumar, Mohit (19 September 2012).
14:
2343:
1018:Jeff Bezos phone hacking incident
515:Analysis of the ZeroAccess botnet
508:
483:Dunn, John E. (2 November 2012).
224:Wyke, James (19 September 2012).
1591:Microarchitectural Data Sampling
827:Ukrainian Power Grid Cyberattack
735:Cyberterrorism attack of June 25
457:Ragan, Steve (31 October 2012).
396:
939:2017 Ukraine ransomware attacks
776:2014 JPMorgan Chase data breach
2312:Distributed computing projects
771:2014 celebrity nude photo leak
302:
199:
1:
1008:Bulgarian revenue agency hack
786:Russian hacker password theft
171:
141:Command and control (malware)
38:while remaining hidden using
1142:Bangladesh Black Hat Hackers
618:(publication of 2009 events)
309:Wyke, James (4 April 2012).
85:
7:
2047:
1003:Baltimore ransomware attack
124:
10:
2348:
1277:Tailored Access Operations
924:WannaCry ransomware attack
817:Ashley Madison data breach
761:Anthem medical data breach
678:PlayStation network outage
533:, Kindsight Security Labs.
527:, Kindsight Security Labs.
254:"ZeroAccess Botnet Surges"
2231:
2055:
1965:
1949:
1903:
1847:
1816:
1760:
1739:
1693:
1652:
1621:
1612:
1383:
1300:
1130:
1030:
1013:WhatsApp snooping scandal
990:
964:
906:
878:Indian Bank data breaches
840:
799:
753:
717:
691:
645:
608:
601:
572:
146:Zombie (computer science)
1555:Speculative Store Bypass
1122:Ukrainian Cyber Alliance
919:2017 Macron e-mail leaks
311:"The ZeroAccess rootkit"
929:Westminster data breach
848:Bangladesh Bank robbery
791:2014 Yahoo! data breach
781:2014 Sony Pictures hack
740:2013 Yahoo! data breach
725:South Korea cyberattack
627:Operation Olympic Games
622:Australian cyberattacks
46:History and propagation
1272:Syrian Electronic Army
982:SingHealth data breach
745:Singapore cyberattacks
683:RSA SecurID compromise
1561:Lazy FP state restore
1345:Kristoffer von Hassel
998:Sri Lanka cyberattack
868:Vietnam Airport Hacks
709:Operation High Roller
2332:Hacking in the 2010s
2279:Operation: Bot Roast
1507:Silent Bob is Silent
567:Hacking in the 2010s
410:. pp. (Page 45)
1441:SS7 vulnerabilities
977:Atlanta cyberattack
946:Equifax data breach
704:Stratfor email leak
653:Canadian government
632:Operation ShadowNet
75:advertising network
2269:Man-in-the-browser
1890:Petya and NotPetya
1519:ROCA vulnerability
1282:The Shadow Brokers
1208:Iranian Cyber Army
1134:persistent threats
934:Petya and NotPetya
898:2016 Bitfinex hack
873:DCCC cyber attacks
832:SWIFT banking hack
350:on 3 December 2012
264:on 3 December 2012
108:Master Boot Record
67:social engineering
2307:Internet security
2292:
2291:
2259:Internet security
2015:
2014:
2011:
2010:
2003:ZeroAccess botnet
1315:Mustafa Al-Bassam
1082:New World Hackers
1045:associated events
1026:
1025:
822:VTech data breach
673:Operation AntiSec
637:Operation Payback
596:
595:
525:ZeroAccess Botnet
156:Internet security
32:Microsoft Windows
2339:
2274:Network security
2239:Browser security
2042:
2035:
2028:
2019:
2018:
1619:
1618:
1292:Yemen Cyber Army
616:Operation Aurora
606:
605:
575:
574:
561:
554:
547:
538:
537:
502:
501:
499:
497:
480:
474:
473:
471:
469:
454:
448:
447:
445:
443:
426:
420:
419:
417:
415:
403:
394:
388:
387:
385:
383:
366:
360:
359:
357:
355:
346:. Archived from
335:
329:
328:
326:
324:
306:
300:
299:
297:
295:
280:
274:
273:
271:
269:
260:. Archived from
249:
243:
242:
240:
238:
221:
215:
214:
203:
197:
196:
193:www.broadcom.com
185:
112:operating system
2347:
2346:
2342:
2341:
2340:
2338:
2337:
2336:
2297:
2296:
2293:
2288:
2227:
2056:Notable botnets
2051:
2046:
2016:
2007:
1961:
1945:
1899:
1843:
1812:
1756:
1735:
1689:
1648:
1608:
1388:
1386:vulnerabilities
1379:
1296:
1189:(confederation)
1152:Charming Kitten
1133:
1126:
1062:Goatse Security
1022:
986:
960:
951:Deloitte breach
902:
888:Dyn cyberattack
836:
795:
766:Operation Tovar
749:
713:
687:
641:
602:Major incidents
597:
568:
565:
511:
506:
505:
495:
493:
481:
477:
467:
465:
455:
451:
441:
439:
427:
423:
413:
411:
401:
395:
391:
381:
379:
367:
363:
353:
351:
336:
332:
322:
320:
307:
303:
293:
291:
289:The Hacker News
281:
277:
267:
265:
250:
246:
236:
234:
222:
218:
205:
204:
200:
189:"Risk Detected"
187:
186:
179:
174:
127:
88:
48:
17:
12:
11:
5:
2345:
2335:
2334:
2329:
2324:
2319:
2314:
2309:
2290:
2289:
2287:
2286:
2281:
2276:
2271:
2266:
2261:
2256:
2251:
2246:
2244:Computer virus
2241:
2235:
2233:
2229:
2228:
2226:
2225:
2220:
2215:
2210:
2205:
2200:
2195:
2190:
2185:
2180:
2175:
2170:
2165:
2160:
2155:
2150:
2145:
2140:
2135:
2130:
2125:
2120:
2115:
2110:
2105:
2100:
2095:
2090:
2085:
2080:
2075:
2070:
2065:
2059:
2057:
2053:
2052:
2045:
2044:
2037:
2030:
2022:
2013:
2012:
2009:
2008:
2006:
2005:
2000:
1995:
1990:
1985:
1980:
1975:
1969:
1967:
1963:
1962:
1960:
1959:
1953:
1951:
1947:
1946:
1944:
1943:
1938:
1933:
1928:
1923:
1918:
1913:
1907:
1905:
1901:
1900:
1898:
1897:
1892:
1887:
1882:
1877:
1872:
1867:
1862:
1857:
1851:
1849:
1845:
1844:
1842:
1841:
1836:
1831:
1826:
1820:
1818:
1814:
1813:
1811:
1810:
1805:
1800:
1795:
1790:
1785:
1780:
1775:
1773:Black Energy 3
1770:
1764:
1762:
1758:
1757:
1755:
1754:
1749:
1743:
1741:
1737:
1736:
1734:
1733:
1728:
1723:
1718:
1713:
1708:
1703:
1697:
1695:
1691:
1690:
1688:
1687:
1682:
1680:Metulji botnet
1677:
1672:
1667:
1662:
1656:
1654:
1650:
1649:
1647:
1646:
1641:
1636:
1634:Black Energy 2
1631:
1625:
1623:
1616:
1610:
1609:
1607:
1606:
1600:
1594:
1588:
1582:
1576:
1570:
1564:
1558:
1552:
1546:
1540:
1534:
1528:
1522:
1516:
1510:
1504:
1498:
1492:
1489:Broadcom Wi-Fi
1486:
1480:
1474:
1468:
1462:
1456:
1450:
1444:
1438:
1432:
1426:
1420:
1414:
1408:
1402:
1395:
1393:
1381:
1380:
1378:
1377:
1372:
1367:
1362:
1357:
1352:
1350:Junaid Hussain
1347:
1342:
1340:Jeremy Hammond
1337:
1335:Elliott Gunton
1332:
1327:
1322:
1317:
1312:
1306:
1304:
1298:
1297:
1295:
1294:
1289:
1284:
1279:
1274:
1269:
1267:Stealth Falcon
1264:
1259:
1254:
1249:
1244:
1242:PLA Unit 61486
1239:
1237:PLA Unit 61398
1234:
1232:Numbered Panda
1229:
1224:
1210:
1205:
1200:
1195:
1190:
1184:
1179:
1177:Equation Group
1174:
1169:
1164:
1159:
1154:
1149:
1144:
1138:
1136:
1128:
1127:
1125:
1124:
1119:
1114:
1109:
1104:
1099:
1094:
1089:
1084:
1079:
1074:
1069:
1064:
1059:
1054:
1049:
1048:
1047:
1036:
1034:
1028:
1027:
1024:
1023:
1021:
1020:
1015:
1010:
1005:
1000:
994:
992:
988:
987:
985:
984:
979:
974:
968:
966:
962:
961:
959:
958:
953:
948:
943:
942:
941:
931:
926:
921:
916:
910:
908:
904:
903:
901:
900:
895:
890:
885:
880:
875:
870:
865:
860:
855:
850:
844:
842:
838:
837:
835:
834:
829:
824:
819:
814:
809:
803:
801:
797:
796:
794:
793:
788:
783:
778:
773:
768:
763:
757:
755:
751:
750:
748:
747:
742:
737:
732:
727:
721:
719:
715:
714:
712:
711:
706:
701:
695:
693:
689:
688:
686:
685:
680:
675:
670:
668:HBGary Federal
665:
660:
655:
649:
647:
643:
642:
640:
639:
634:
629:
624:
619:
612:
610:
603:
599:
598:
594:
593:
587:
582:
573:
570:
569:
564:
563:
556:
549:
541:
535:
534:
528:
522:
510:
509:External links
507:
504:
503:
475:
449:
421:
389:
361:
330:
301:
275:
244:
216:
211:securelist.com
198:
176:
175:
173:
170:
169:
168:
163:
158:
153:
151:Internet crime
148:
143:
138:
133:
126:
123:
92:bitcoin mining
87:
84:
47:
44:
15:
9:
6:
4:
3:
2:
2344:
2333:
2330:
2328:
2325:
2323:
2320:
2318:
2315:
2313:
2310:
2308:
2305:
2304:
2302:
2295:
2285:
2282:
2280:
2277:
2275:
2272:
2270:
2267:
2265:
2262:
2260:
2257:
2255:
2252:
2250:
2249:Computer worm
2247:
2245:
2242:
2240:
2237:
2236:
2234:
2232:Main articles
2230:
2224:
2221:
2219:
2216:
2214:
2211:
2209:
2206:
2204:
2201:
2199:
2196:
2194:
2191:
2189:
2186:
2184:
2181:
2179:
2176:
2174:
2171:
2169:
2166:
2164:
2161:
2159:
2156:
2154:
2151:
2149:
2146:
2144:
2141:
2139:
2136:
2134:
2131:
2129:
2126:
2124:
2121:
2119:
2116:
2114:
2111:
2109:
2106:
2104:
2101:
2099:
2096:
2094:
2091:
2089:
2086:
2084:
2081:
2079:
2076:
2074:
2071:
2069:
2066:
2064:
2061:
2060:
2058:
2054:
2050:
2043:
2038:
2036:
2031:
2029:
2024:
2023:
2020:
2004:
2001:
1999:
1996:
1994:
1991:
1989:
1986:
1984:
1981:
1979:
1976:
1974:
1971:
1970:
1968:
1964:
1958:
1955:
1954:
1952:
1948:
1942:
1939:
1937:
1934:
1932:
1929:
1927:
1924:
1922:
1919:
1917:
1914:
1912:
1909:
1908:
1906:
1902:
1896:
1893:
1891:
1888:
1886:
1883:
1881:
1878:
1876:
1873:
1871:
1868:
1866:
1863:
1861:
1858:
1856:
1853:
1852:
1850:
1846:
1840:
1837:
1835:
1832:
1830:
1827:
1825:
1822:
1821:
1819:
1815:
1809:
1806:
1804:
1803:Gameover ZeuS
1801:
1799:
1796:
1794:
1791:
1789:
1786:
1784:
1781:
1779:
1776:
1774:
1771:
1769:
1766:
1765:
1763:
1759:
1753:
1750:
1748:
1745:
1744:
1742:
1738:
1732:
1729:
1727:
1724:
1722:
1719:
1717:
1714:
1712:
1709:
1707:
1704:
1702:
1699:
1698:
1696:
1692:
1686:
1683:
1681:
1678:
1676:
1673:
1671:
1668:
1666:
1663:
1661:
1658:
1657:
1655:
1651:
1645:
1642:
1640:
1637:
1635:
1632:
1630:
1627:
1626:
1624:
1620:
1617:
1615:
1611:
1604:
1601:
1598:
1595:
1592:
1589:
1586:
1583:
1580:
1577:
1574:
1571:
1568:
1565:
1562:
1559:
1556:
1553:
1550:
1547:
1544:
1541:
1538:
1535:
1532:
1529:
1526:
1523:
1520:
1517:
1514:
1511:
1508:
1505:
1502:
1499:
1496:
1493:
1490:
1487:
1484:
1481:
1478:
1475:
1472:
1469:
1466:
1463:
1460:
1457:
1454:
1451:
1448:
1445:
1442:
1439:
1436:
1433:
1430:
1427:
1424:
1421:
1418:
1415:
1412:
1409:
1406:
1403:
1400:
1397:
1396:
1394:
1392:
1387:
1382:
1376:
1373:
1371:
1368:
1366:
1363:
1361:
1358:
1356:
1353:
1351:
1348:
1346:
1343:
1341:
1338:
1336:
1333:
1331:
1328:
1326:
1323:
1321:
1318:
1316:
1313:
1311:
1308:
1307:
1305:
1303:
1299:
1293:
1290:
1288:
1285:
1283:
1280:
1278:
1275:
1273:
1270:
1268:
1265:
1263:
1262:Rocket Kitten
1260:
1258:
1255:
1253:
1250:
1248:
1245:
1243:
1240:
1238:
1235:
1233:
1230:
1228:
1225:
1222:
1218:
1214:
1213:Lazarus Group
1211:
1209:
1206:
1204:
1201:
1199:
1196:
1194:
1191:
1188:
1185:
1183:
1180:
1178:
1175:
1173:
1170:
1168:
1165:
1163:
1160:
1158:
1155:
1153:
1150:
1148:
1145:
1143:
1140:
1139:
1137:
1135:
1129:
1123:
1120:
1118:
1115:
1113:
1110:
1108:
1105:
1103:
1100:
1098:
1095:
1093:
1090:
1088:
1085:
1083:
1080:
1078:
1075:
1073:
1070:
1068:
1065:
1063:
1060:
1058:
1055:
1053:
1050:
1046:
1043:
1042:
1041:
1038:
1037:
1035:
1033:
1029:
1019:
1016:
1014:
1011:
1009:
1006:
1004:
1001:
999:
996:
995:
993:
989:
983:
980:
978:
975:
973:
970:
969:
967:
963:
957:
956:Disqus breach
954:
952:
949:
947:
944:
940:
937:
936:
935:
932:
930:
927:
925:
922:
920:
917:
915:
912:
911:
909:
905:
899:
896:
894:
891:
889:
886:
884:
881:
879:
876:
874:
871:
869:
866:
864:
861:
859:
856:
854:
851:
849:
846:
845:
843:
839:
833:
830:
828:
825:
823:
820:
818:
815:
813:
810:
808:
805:
804:
802:
798:
792:
789:
787:
784:
782:
779:
777:
774:
772:
769:
767:
764:
762:
759:
758:
756:
752:
746:
743:
741:
738:
736:
733:
731:
730:Snapchat hack
728:
726:
723:
722:
720:
716:
710:
707:
705:
702:
700:
699:LinkedIn hack
697:
696:
694:
690:
684:
681:
679:
676:
674:
671:
669:
666:
664:
661:
659:
656:
654:
651:
650:
648:
644:
638:
635:
633:
630:
628:
625:
623:
620:
617:
614:
613:
611:
607:
604:
600:
592: →
591:
588:
586:
583:
581:
578:←
577:
576:
571:
562:
557:
555:
550:
548:
543:
542:
539:
532:
529:
526:
523:
520:
517:, created by
516:
513:
512:
492:
491:
486:
479:
464:
460:
453:
438:
437:
432:
425:
409:
408:
400:
397:Wyke, James.
393:
378:
377:
372:
365:
349:
345:
341:
334:
318:
317:
312:
305:
290:
286:
279:
263:
259:
255:
248:
233:
232:
227:
220:
212:
208:
202:
194:
190:
184:
182:
177:
167:
164:
162:
159:
157:
154:
152:
149:
147:
144:
142:
139:
137:
134:
132:
129:
128:
122:
119:
117:
113:
109:
105:
104:pay per click
101:
97:
93:
83:
79:
76:
72:
68:
64:
59:
57:
53:
43:
41:
37:
33:
30:that affects
29:
25:
21:
2294:
2284:Trojan horse
2217:
2002:
1747:CryptoLocker
1501:DoublePulsar
1320:Cyber Anakin
1310:Ryan Ackroyd
1203:Helix Kitten
1198:Hacking Team
1193:Guccifer 2.0
1067:Lizard Squad
883:Surkov leaks
812:Hacking Team
494:. Retrieved
488:
478:
466:. Retrieved
463:SecurityWeek
462:
452:
440:. Retrieved
436:The Register
434:
424:
412:. Retrieved
405:
392:
380:. Retrieved
376:Ars Technica
374:
364:
352:. Retrieved
348:the original
343:
333:
321:. Retrieved
314:
304:
292:. Retrieved
288:
278:
266:. Retrieved
262:the original
258:Dark Reading
257:
247:
235:. Retrieved
229:
219:
210:
201:
192:
120:
89:
80:
60:
49:
42:techniques.
24:Trojan horse
19:
18:
1983:NetTraveler
1921:LogicLocker
1829:Hidden Tear
1726:Red October
1585:Dragonblood
1495:EternalBlue
1459:Stagefright
1325:George Hotz
1302:Individuals
1052:CyberBerkut
496:27 December
468:27 December
442:27 December
414:27 December
354:27 December
323:27 December
319:. p. 2
294:27 December
268:27 December
237:27 December
161:Click fraud
96:click fraud
2301:Categories
2218:ZeroAccess
1926:Rensenware
1911:BrickerBot
1839:TeslaCrypt
1629:Bad Rabbit
1579:Foreshadow
1483:Cloudbleed
1435:Row hammer
1417:Shellshock
1411:Heartbleed
1399:Evercookie
1375:The Jester
1257:Red Apollo
1217:BlueNorOff
1187:GOSSIPGIRL
1182:Fancy Bear
1172:Elfin Team
1167:DarkMatter
1162:Dark Basin
1147:Bureau 121
1107:Teamp0ison
1032:Hacktivism
663:DNSChanger
382:9 December
344:ThreatPost
172:References
166:Clickbot.A
20:ZeroAccess
2208:Vulcanbot
2098:Conficker
1957:VPNFilter
1834:Rombertik
1798:FinFisher
1788:DarkHotel
1752:DarkSeoul
1660:Coreflood
1525:BlueBorne
1477:Dirty COW
1391:disclosed
1389:publicly
1227:NSO Group
1157:Cozy Bear
1097:PayPal 14
1040:Anonymous
914:SHAttered
658:DigiNotar
490:Techworld
86:Operation
26:computer
2327:Rootkits
2317:Spamming
2178:Slenfbot
2143:Mariposa
2128:Koobface
2088:Bredolab
2083:BASHLITE
1998:Titanium
1941:XafeCopy
1936:WannaCry
1865:KeRanger
1793:Duqu 2.0
1778:Carbanak
1597:BlueKeep
1573:SigSpoof
1531:Meltdown
1447:WinShock
1429:Rootpipe
1330:Guccifer
1252:Pranknet
1247:PLATINUM
1221:AndAriel
1132:Advanced
1087:NullCrew
1072:LulzRaft
972:Trustico
585:Timeline
125:See also
100:bitcoins
2322:Botnets
2264:Malware
2213:Waledac
2168:Rustock
2158:Metulji
2123:Kelihos
2118:Gumblar
2093:Cutwail
2049:Botnets
1895:X-Agent
1885:Pegasus
1768:Brambul
1731:Shamoon
1675:Kelihos
1665:Alureon
1644:Stuxnet
1614:Malware
1567:TLBleed
1549:Exactis
1537:Spectre
1471:Badlock
1405:iSeeYou
1370:Topiary
1102:RedHack
1092:OurMine
1077:LulzSec
136:Malware
63:rootkit
52:rootkit
40:rootkit
28:malware
2254:Malbot
2198:Torpig
2183:Srizbi
2173:Sality
2148:Mega-D
2138:Lethic
2133:Kraken
2103:Donbot
2073:Asprox
1978:Joanap
1931:Triton
1870:Necurs
1860:Jigsaw
1855:Hitler
1824:Dridex
1783:Careto
1706:Dexter
1639:SpyEye
1605:(2019)
1599:(2019)
1593:(2019)
1587:(2019)
1581:(2018)
1575:(2018)
1569:(2018)
1563:(2018)
1557:(2018)
1551:(2018)
1545:(2018)
1539:(2018)
1533:(2018)
1527:(2017)
1521:(2017)
1515:(2017)
1509:(2017)
1503:(2017)
1497:(2017)
1491:(2017)
1485:(2017)
1479:(2016)
1473:(2016)
1467:(2016)
1461:(2015)
1455:(2015)
1453:JASBUG
1449:(2014)
1443:(2014)
1437:(2014)
1431:(2014)
1425:(2014)
1423:POODLE
1419:(2014)
1413:(2014)
1407:(2013)
1401:(2010)
1384:Major
1365:Track2
1287:xDedic
1117:UGNazi
519:Sophos
407:Sophos
316:Sophos
231:Sophos
131:Botnet
116:TCP/IP
71:keygen
56:Sophos
36:botnet
2203:Virut
2193:TDL-4
2188:Storm
2163:Nitol
2153:Mirai
2108:Festi
2078:Bagle
2068:Akbot
1993:Tinba
1880:Mirai
1808:Regin
1721:Mahdi
1716:Flame
1701:Carna
1685:Stars
1603:Kr00k
1543:EFAIL
1513:KRACK
1465:DROWN
590:2020s
580:2000s
402:(PDF)
22:is a
2223:Zeus
2113:Grum
1988:R2D2
1973:Grum
1966:2019
1950:2018
1916:Kirk
1904:2017
1875:MEMZ
1848:2016
1817:2015
1761:2014
1740:2013
1694:2012
1670:Duqu
1653:2011
1622:2010
1360:Sabu
1112:TDO
1057:GNAA
991:2019
965:2018
907:2017
841:2016
800:2015
754:2014
718:2013
692:2012
646:2011
609:2010
498:2012
470:2012
444:2012
416:2012
384:2013
356:2012
325:2012
296:2012
270:2012
239:2012
2063:3ve
1711:FBI
1355:MLT
1219:) (
94:or
2303::
487:.
461:.
433:.
404:.
373:.
342:.
313:.
287:.
256:.
228:.
209:.
191:.
180:^
2041:e
2034:t
2027:v
1223:)
1215:(
560:e
553:t
546:v
521:.
500:.
472:.
446:.
418:.
386:.
358:.
327:.
298:.
272:.
241:.
213:.
195:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.