Microsoft takedown of Zeus botnets missed a few C&Cs
Posted on 04.04.2012
When Microsoft, the financial services industry and Kyrus Tech teamed up to sinkhole a number of worldwide botnets using the Zeus family of malware, they managed to get the court's permission to seize the C&C servers in two hosting locations in the US.

But, according to FireEye's Atif Mushtaq, they haven't succeeded in taking down all of them, and of the remaining nine of one particular botnet, three (isdfsrttyqza.c0m.li, mylemain.com and stockli.us) are still active and sending out commands to zombie computers.

Mushtaq says that it is no wonder, as this particular Zeus variant is known for rapidly changing its C&C servers.

Two of the servers still out of reach of Microsoft are no longer resolving to an IP address, and four have been abandoned.

"I am not sure why the MS Digital Crime Unit has not been able to sinkhole all the C&C domains," he says. "Their main concern should be the three active domains. Without these domains completely destroyed, this botnet can not be officially declared as dead."






Spotlight

Staples customers likely the latest victims of credit card breach

Posted on 21 October 2014.  |  Multiple banks say they have identified a pattern of credit and debit card fraud suggesting that several Staples Inc. office supply locations in the Northeastern United States are currently dealing with a data breach.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Oct 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //