Error de autenticación

Ha habido un problema a la hora de conectarse a la red social. Por favor intentalo de nuevo

Si el problema persiste, nos lo puedes decir AQUÍ


Suscribete para recibir las noticias más relevantes

Recibir alertas

¿Quieres recibir una notificación por email cada vez que Cesarromero escriba una noticia?

Nueva versión del virus Flame detectado en Irán y Líbano

18/10/2012 14:40 0 Comentarios Lectura: ( palabras)

"The order allows microsoft to host the domain, which hosted the Nitol botnet, through microsoft 's newly created domain name system (DNS). This system enables microsoft to block operation of the Nitol botnet and nearly 70, 000 other malicious subdomains hosted on the domain, while allowing all other traffic for the legitimate subdomains to operate without disruption, " he said in the post. microsoft discovered Nitol while investigating how cybercriminals are abusing the third party software supply chain with counterfeit software rigged with malware -- one of the vectors Nitol used to spread its bot malware.70-459Like any botnet takedown, the effects were immediate -- but likely only temporary. The domain hosts about half of Nitol's domains. And nearly 86 percent of Nitol's servers operate out of China, and nearly 10 percent out of the U.S.Gunter Ollmann, vice president of research at Damballa, so far counts more than 70 different botnets that rely on the microsoft domain for their command-and-control infrastructure, with some 407 domains within being used for C&C. But the domain is just one malicious domain among many: "Most of the 70-plus botnets have C&C in other Dynamic DNS hosting providers as backup. So takedown of 3322 .org is inconvenient, but not end-of-days, " Ollmann says. It will provide some insight into the infections and command-and-control, however, according to Ollmann.

Más sobre


Sobre esta noticia

Cesarromero (793 noticias)
Distribución gratuita
¿Problemas con esta noticia?
Denunciar esta noticia por



Aún no hay comentarios en esta noticia.