Tag Archive | "worms"


25 January 2011 | 14,873 views

Digital Underground Offering Cheap Botnets For Hire

Perhaps even the cyber-criminals are effected by the recent recession – botnets for hire are hitting rock-bottom rates starting at just $2. We reported back in April 2010 about the Texas Man Who Pleaded Guilty To Bot Network For Hire. They are becoming more multi-talented as well rather than just offering bot networks for DDoS [...]

Continue Reading


29 April 2010 | 6,773 views

Texas Man Pleads Guilty To Bot Network For Hire

Another botnet herder bites the dust, the latest news in the malware arena is about David Anthony Edwards from Texas who has admitted he and his accomplice had offered tailor made malware and DDoS attacks for rent. 22,000 zombies is a reasonable number of bots for a herder to control on their own, and assuming [...]

Continue Reading


17 August 2009 | 13,394 views

Twitter Being Used As Botnet Command Channel

Ah Twitter in the news again, the bad guys sure do keep up with new trends. After being taken offline for a while by a Joejob DDoS attack Twitter is in the news again – this time it’s being used as the command channel for a Botnet. The normal method for controlling Botnets is via [...]

Continue Reading


30 July 2009 | 21,704 views

Chinese Firm Writes First SMS Worm

Ah another first, and once again China is at the forefront! We recently reported about a Chinese company sharing their huge malware database and now a group of Chinese companies has managed to develop the first SMS worm! It’s a pretty cool concept, abusing the Symbian Express Signing procedure. It reminds me of the heydays [...]

Continue Reading


16 July 2009 | 11,307 views

Chinese Company Shares Huge Malware Database

We need more companies like this that acknowledge hoarding data isn’t doing anything for the greater good, to really stamp out the core problems you have to share the data you’ve correlated across the World so everyone can put together what they have and do something about it. It seems like with China pumping out [...]

Continue Reading


05 May 2009 | 5,232 views

Torpig Botnet Hijacking Reveals 70GB Of Stolen Data

We did mention Torpig in passing back in January 2008 when talking about the Mebroot rootkit which digs down deep into the Master Boot Record. It seems like Torpig has been pretty active since then and the latest break is that some security researchers have managed to infiltrate the botnet and collect some data on [...]

Continue Reading


10 April 2009 | 9,431 views

Conficker Finally Awakes & Dumps Payload

So it seems something big was brewing with Conficker, they just didn’t want to do what everyone expected and unleash it on April 1st when all eyes were on them. Smart move really, they kept quiet and waited a week or so after before dropping some fairly serious and complex payloads (encrypted rootkits). It seems [...]

Continue Reading


06 April 2009 | 9,552 views

How to Scan for Conficker Worm

A bit of an update to the conficker worm that is supposedly scheduled for new updates and instructions today wednesday 1st. April 2009 and that nobody except for the bad guys knows what those instructions would be. Fyodor has rolled out a new nmap beta release to the nmap scripting engine that enables it to [...]

Continue Reading


02 April 2009 | 7,848 views

Conficker Day – April 1st – Uneventful

So the big Conficker scare of April 1st has passed without any real events, no major sites taken down, no major online terror campaigns spawned. Just a new more sophisticated, harder to stop version of Conficker updating from a longer list of domains. It seems like this malware might be here to stay and infecting [...]

Continue Reading


18 March 2009 | 5,487 views

New Conficker Variant More Aggressive

Conficker has gotten quite a lot of news recently with it growing so fast and Microsoft offering a bounty for the authors. It seems like the Conficker authors are really serious about retaining control of their botnet and expanding it further without hindrance from the companies trying to stop them. It’s quite likely they are [...]

Continue Reading


Popular Tags

computer-security · darknet · exploits · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · Information-Security · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·