There have been several victories against major botnets in the past few months, the most recent being the shutdown of the Coreflood botnet. Even though law enforcement officials have successfully collaborated with various industry experts—including Microsoft's Digital Crimes Unit and Symantec—to track down and seize command-and-control servers pumping instructions to infected machines, for the most part the operators remain at large. Many users were unaware their systems had been compromised in the first place and may still be infected even though the C&C servers are offline. With these dormant machines out there, it's possible that operators can resurrect the botnet at a later time and push out updated instructions to awaken its zombie army. "It stands to reason that when we stop seeing new exploits, that the entire botnet has to be on the decline," Patrick Cummins, a security malware researcher at Blue Coat Security, told eWEEK. The success and ultimate survival of the botnet depend on being able to continuously update its zombies. The U.S. Department of Justice employed a controversial technique to ensure Coreflood can't be revived by overwriting the malicious code on compromised systems with a new set of instructions.
Let Prohm's Posse Ride: Hallice, Brady, Stu, Lard, Naz, Deonte, Monte, Matt, Simeon, Jordan, and Babb.
All content owned by CycloneFanatic.com - All rights reserved 2005-09. By viewing this website you agree to the Terms of Service, Site Rules and Legal Disclaimer. The words, views, images and opinions expressed or provided by users do not reflect the opinions or views of CycloneFanatic.com or Iowa State University. The names, words, symbols, and graphics representing Iowa State University are trademarks and copyrights of the University protected by the trademark and copyright laws of the United States of America and other countries and are used on this web site under license from the University. Original site design, premise & construction by Jeremy Lind.