Microsoft's study into unsecure supply chains leads to botnet disruption
Posted on 13.09.2012
Microsoft's Digital Crimes Unit has disrupted the functioning of yet another botnet by effecting a takedown of a domain which was also hosting over 500 different strains of malware and has been linked to malicious activity since 2008.

The takedown is the result of an investigation that Microsoft has launched in order to find out how criminals use supply chains to introduce counterfeit software embedded with malware. During the investigation they discovered that twenty percent of the PCs the researchers bought from an unsecure supply chain were infected with malware, and that unsuspecting victims have their newly bought computers automatically enslaved in a botnet and ready to spy on its owners and infect other computers by spreading via USB flash drives.

By filing suit with the U.S. District Court for the Eastern District of Virginia, Microsoft was granted a restraining order against an individual by the name of Peng Yong, his company, and three other unnamed individuals behind the scheme, as well as the permission to transfer the hosting of the domain in question ( and nearly 70,000 of its subdomains to Microsoft.

The malware strains found on these subdomains are capable of many malicious actions - from remotely turning on an infected computerís microphone and video camera to recording keystrokes.

"The Nitol botnet malware itself carries out distributed denial of service (DDoS) attacks that are able to cripple large networks by overloading them with Internet traffic, and creates hidden access points on the victimís computer to allow even more malware - or anything else for that matter - to be loaded onto an infected computer," explained Richard Boscovich, Assistant General Counsel with the Microsoft Digital Crimes Unit.

While the botnet cannot be considered dead, its operation has obviously been crippled for the time being.

"Microsoft is fully committed to protecting consumers by combating the distribution of counterfeit software and working closely with governments, law enforcement and other industry members in these efforts. Our disruption of the Nitol botnet further demonstrates our resolve to take all necessary steps to protect our customers and discourage criminals from defrauding them into using malware infected counterfeit software," says Boscovich.

He also offered advice on how users can prevent themselves for falling for such schemes: beware of deals that appear too good to be true.


Harnessing artificial intelligence to build an army of virtual analysts

PatternEx, a startup that gathered a team of AI researcher from MIT CSAIL as well as security and distributed systems experts, is poised to shake up things in the user and entity behavior analytics market.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Mon, Feb 8th