Print 6 comment(s) - last by Wolfpup.. on Sep 19 at 3:04 PM

Microsoft marks it second botnet take down in 6-months

Microsoft has a Digital Crimes Unit that is tasked in part with helping discover and destroy botnets. Botnets are often responsible for a huge amount of spam e-mail sent to people all around the world and can be used for other nefarious deeds. Microsoft's Digital Crimes Unit has recently set it sights on the new emerging botnet called Nitol.  
Earlier this week, the U.S. District Court for the Eastern District of Virginia granted the Microsoft Digital Crimes Unit permission to disrupt more than 500 different strains of malware that have the potential to target millions of people around the world.
The operation was code-named Operation b70. The operation came from a Microsoft study that found cyber criminals were able to infiltrate unsecure supply chains to introduce counterfeit software embedded with malware with the sole purpose of secretly infecting user's computers around the world.
By disrupting the malware strains, Microsoft says that it helped to limit the spread of the developing Nitol botnet. Microsoft previously disrupted the Zeus botnet, making the disruption of Nitol the second botnet Microsoft has disrupted this year. Microsoft says that in Operation b70 it was discovered that retailers were selling computers loaded with counterfeit versions of Windows software that were embedded with malware.
The malware in question allowed criminals to steal personal information from users and abuse their online services such as e-mail, social networking accounts, and online bank accounts. Microsoft says one of the most disturbing components of this counterfeit software was that the malware could've been introduced into the supply chain at any point where the computer travels between companies. That means that consumers have no way to know they're buying a machine from an unsecured supply chain.
Microsoft says that 20% of the computers researchers in the operation purchased from an unsecure supply chain were infected with malware. The researchers also noted that the malware was able to spread through devices, including flash drives allowing it to infect other machines.

Source: Technet

Comments     Threshold

This article is over a month old, voting and posting comments is disabled

Another reason...
By Jackthegreen on 9/13/2012 2:11:35 PM , Rating: 2
to demand CDs to reinstall the software. Getting rid of bloatware? Check. Getting rid of possible malware? Check.

Finding out that Firefox's dictionary knows bloatware is a word but malware isn't? Priceless.

RE: Another reason...
By Solandri on 9/13/2012 2:47:23 PM , Rating: 5
In this case, the (counterfeit) reinstall DVDs would have already had the malware on them.

Except for a few vendors using proprietary custom versions of Windows, there's no longer any need to demand reinstall DVDs. You can download the official ones yourself, and just use the product key on the sticker on your computer. You'll still need to get drivers from the manufacturer though.

"If you mod me down, I will become more insightful than you can possibly imagine." -- Slashdot

Copyright 2015 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki