Bot herders try to resurrect Grum, fail
Posted on 24 July 2012.
As you have probably already heard, the Grum botnet - formerly the third largest in the world - has been effectively shut down last week after several security researchers managed to coordinate the takedown of its last-standing C&C servers in Ukraine and Russia.


Expectedly, the botnet's herders have not sat idly by while their livelihood was threatened, and they mounted a last-ditch attempt at regaining control of at least one segment of the botnet.

"In the absence of any built-in fallback mechanisms, the bot herders used another fallback mechanism that is called money," FireEye's Atif Mushtaq reported yesterday.

"Over the weekend we found that the Ukrainian ISP SteepHost removed the null route on three CnCs that were taken down last week. We suspect the bot herders must have paid a large amount of money in order to get access to these servers."

The move resulted in a short burst of spam sent by the botnet, but any further action was quickly thwarted by security researchers who contacted SteepHost and negotiated once more the shutdown of the servers in question.

The ISP says that the servers were back online due to break-ins and security related issues. Still, they were effectively threatened with the possibility of getting de-peered off the Internet by their upstream provider or of getting their subnet blacklisted if something like this happens again.






Spotlight

Patching: The least understood line of defense

Posted on 29 August 2014.  |  How many end users, indeed how many IT pros, truly get patching? Sure, many of us see Windows install updates when we shut down our PC and think all is well. Itís not.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Sep 2nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //