Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
Symantec and Microsoft work together to disrupt botnet
Posted on 8-Feb-2013 13:22 | Tags Filed under: News



Symantec and Microsoft have joined forces to successfully tackle the Bamital botnet, which helped cyber gangs steal more than US$1.1 million annually.

Symantec has been tracking this botnet since late 2009 and recently partnered with Microsoft to identify and shut down all known components vital to the botnet's operation.

Bamital is a malware family whose primary purpose is to hijack search engine results, redirecting clicks to an attacker controlled command-and-control (C&C) server. The C&C server redirects the results to websites of the attackers' choosing.

Bamital also has the ability to click on advertisements without user interaction. This results in poor user experience when using search engines along with an increased risk of further malware infections.

The malware’s origin can be tracked back to late 2009 and has evolved through multiple variations over the past couple of years. Bamital has primarily propagated through drive-by-downloads and maliciously modified files in peer-to-peer (P2P) networks.

From analysis of a single Bamital C&C server over a six-week period in 2011 we were able to identify more than 1.8 million unique IP addresses communicating with the server, and an average of three million clicks being hijacked on a daily basis.

Recent information from the botnet shows the number of requests reaching the C&C server to be well over one million per day.

Clickfraud, the name used for the type of fraud committed by Bamital, is the process of a human or automated script emulating online user behaviour and clicking on online advertisements for monetary gain.

Bamital redirected end users to ads and content which they did not intend to visit. It also generated non-human initiated traffic on ads and websites with the intention of getting paid by ad networks. Bamital was also responsible for redirecting users to websites peddling malware under the guise of legitimate software.

Bamital is just one of many botnets that utilise clickfraud for monetary gain and to foster other cybercrime activities. Many of the attackers behind these schemes feel they are low risk as many users are unaware that their computers are being used for these activities.


More information: http://www.norton.com/bamital...




comments powered by Disqus


Trending now »

Hot discussions in our forums right now:

Tipping? Please no!
Created by BlueShift, last reply by nate on 23-May-2017 16:47 (78 replies)
Pages... 4 5 6


Father banned from watching daughter's netball game: what you think of this?
Created by Rikkitic, last reply by Kyanar on 23-May-2017 16:57 (126 replies)
Pages... 7 8 9


Tailgaters?
Created by Linuxluver, last reply by SepticSceptic on 23-May-2017 17:07 (90 replies)
Pages... 4 5 6


The President Of The USA: Donald Trump
Created by TimA, last reply by kingdragonfly on 23-May-2017 07:44 (4357 replies)
Pages... 289 290 291


ANZ Bank Anti Money Laundering
Created by kiwiharry, last reply by Earbanean on 23-May-2017 16:49 (19 replies)
Pages... 2


Automate "Dumb" Heatpump
Created by Paul1977, last reply by solutionz on 23-May-2017 10:03 (38 replies)
Pages... 2 3


Can I record a Sky programme using my Panasonic hard disk recorder?
Created by PSLog, last reply by JimmyH on 21-May-2017 13:42 (34 replies)
Pages... 2 3


Changes to Fibre PPPoE overnight?
Created by kiwirock, last reply by kiwirock on 23-May-2017 17:05 (15 replies)