Microsoft Puts the Smack Down on Emerging Nitol Botnet
September 13, 2012 9:32 AM
comment(s) - last by
Microsoft marks it second botnet take down in 6-months
Microsoft has a Digital Crimes Unit that is tasked in part with helping discover and destroy botnets. Botnets are often responsible for a huge amount of spam e-mail sent to people all around the world and can be used for other nefarious deeds. Microsoft's Digital Crimes Unit has recently set it sights on the new emerging botnet called Nitol.
Earlier this week, the U.S. District Court for the Eastern District of Virginia granted the Microsoft Digital Crimes Unit permission to disrupt more than 500 different strains of malware that have the potential to target millions of people around the world.
The operation was code-named Operation b70. The operation came from a Microsoft study that found cyber criminals were able to infiltrate unsecure supply chains to introduce counterfeit software embedded with malware with the sole purpose of secretly infecting user's computers around the world.
By disrupting the malware strains, Microsoft says that it helped to limit the spread of the developing Nitol botnet. Microsoft previously disrupted the
, making the disruption of Nitol the second botnet Microsoft has disrupted this year. Microsoft says that in Operation b70 it was discovered that retailers were selling computers loaded with counterfeit versions of Windows software that were embedded with malware.
The malware in question allowed criminals to steal personal information from users and abuse their online services such as e-mail, social networking accounts, and online bank accounts. Microsoft says one of the most disturbing components of this counterfeit software was that the malware could've been introduced into the supply chain at any point where the computer travels between companies. That means that consumers have no way to know they're buying a machine from an unsecured supply chain.
Microsoft says that 20% of the computers researchers in the operation purchased from an unsecure supply chain were infected with malware. The researchers also noted that the malware was able to spread through devices, including flash drives allowing it to infect other machines.
This article is over a month old, voting and posting comments is disabled
RE: I like this
9/13/2012 3:08:09 PM
It's like the Limewire and Kazaa days all over again!
"My sex life is pretty good" -- Steve Jobs' random musings during the 2010 D8 conference
Wrath of the Titans: Microsoft, U.S. Feds Slay Godly "Zeus" Botnets
March 26, 2012, 3:21 PM
Report: AT&T Eyeing $40B DirecTV Purchase
May 1, 2014, 8:00 AM
WebOS Class Action Settlement Costs HP $57 Million
April 1, 2014, 10:22 AM
IBM Workers Strike Over Terms of Deal That Will Have Them Working for Lenovo
March 6, 2014, 9:29 AM
Google Picking Up Artificial Intelligence Company "DeepMind" for $400 Million
January 27, 2014, 9:25 AM
Quick Note: Qualcomm Grabs up Palm, IPAQ, and Bitfone Patent Portfolio from HP
January 24, 2014, 9:18 AM
Verizon Buys Intel Media OnCue Cloud TV assets
January 21, 2014, 10:26 AM
Most Popular Articles
Numerous Leaks Detail 4.7" iPhone 6 Processor, RAM, Cellular and NFC Capabilities
August 29, 2014, 10:37 PM
Windows 9: "Upgrade Now" Button Coming for Enterprise Updates, ARM Preview in H1 2015
August 26, 2014, 8:00 PM
L.A. Unified School District’s Apple iPad Contract Canceled Following Heavy Criticism
August 26, 2014, 12:37 PM
Apple Builds Not-So-Secret Secret 3-Story Tower for iPhone 6/iWatch Unveil
August 28, 2014, 3:41 PM
Netflix Accuses Comcast of Ripping Off Customers, Files to Block Merger
August 26, 2014, 5:49 PM
Latest Blog Posts
Space Terrorism is a Looming Threat For the United States
Apr 23, 2014, 7:47 PM
Facebook Aims to Provide Internet to "Every Person in the World" with Drones, Satellites
Apr 1, 2014, 10:20 AM
Retail Mobile Sites Experience Outages in Light of Simplexity's Bankruptcy
Mar 14, 2014, 8:48 AM
Tesla vs. BMW: Who Has the Safer EV?
Feb 1, 2014, 2:56 PM
Justice Leaks Details of Next HTC One Two Flagship Phone
Dec 5, 2013, 4:04 PM
More Blog Posts
Copyright 2014 DailyTech LLC. -
Terms, Conditions & Privacy Information