spambot

Latest

  • Getty Images/iStockphoto

    'Onliner' malware spambot targets 711 million email accounts

    by 
    Mariella Moon
    Mariella Moon
    08.30.2017

    A security researcher who goes by the name Benkow has discovered a spambot with 711 million email addresses at its disposal. Troy Hunt, who runs the website Have I Been Pwned, said it's "the largest single set of data" he's ever loaded into his searchable database of compromised accounts. Prior to its discovery, the largest he's had to upload contained 393 million records. The spambot called "Onliner" is used as a way to deliver the Ursnif banking malware made to infect Windows computers. Worse, it's capable of bypassing spam filters, so someone not paying close attention to the sender's email address could end up infected.

  • US government to beat back botnets with a cybersecurity code of conduct

    by 
    Amar Toor
    Amar Toor
    09.23.2011

    Old Uncle Sam seems determined to crack down on botnets, but he still needs a little help figuring out how to do so. On Wednesday, the Department of Homeland Security and National Institute of Standards and Technology (NIST) published a request for information, inviting companies from internet and IT companies to contribute their ideas to a voluntary "code of conduct" for ISPs to follow when facing a botnet infestation. The move comes as an apparent response to a June "Green Paper" on cybersecurity, in which the Department of Commerce's Internet Policy Task Force called for a unified code of best practices to help ISPs navigate through particularly treacherous waters. At this point, the NIST is still open to suggestions from the public, though Ars Technica reports that it's giving special consideration to two models adopted overseas. Australia's iCode program, for example, calls for providers to reroute requests from shady-looking systems to a site devoted to malware removal. The agency is also taking a hard look at an initiative (diagrammed above) from Japan's Cyber Clean Center, which has installed so-called "honeypot" devices at various ISPs, allowing them to easily detect and source any attacks, while automatically notifying their customers via e-mail. There are, however, some lingering concerns, as the NIST would need to find funding for its forthcoming initiative, whether it comes from the public sector, corporations or some sort of public-private partnership. Plus, some are worried that anti-botnet programs may inadvertently reveal consumers' personal information, while others are openly wondering whether OS-makers should be involved, as well. The code's public comment period will end on November 4th, but you can find more information at the source link, below.

  • FBI charges 23-year old Russian in Mega-D spambot investigation

    by 
    Laura June Dziuban
    Laura June Dziuban
    12.06.2010

    If you recall, last year it was revealed that up to 35 percent of the world's spam could spring from one source: a bot known as Mega-D. According to FBI files acquired by The Smoking Gun, the bot infected over half a million computers and could sent ten billion pieces of spam per day. According to the files, an ongoing investigation targets a 23-year old Russian man named Oleg Nikolaenko, who is suspected of violating the anti-spam law. Two people have previously been charged with felony conspiracy for the spam assault -- which sold fake Rolexes and herbal stimulants -- both of whom seemingly pointed the finger at Nikolaenko as the actual transmitter. The Mega-D bot was shut down last year by FireEye network security after identifying it as a mega-source of spam. While it's back up and running today, it is only a shadow of its former self. Nikolaenko appeared in federal court in Wisconsin on Friday, was formally charged and entered a 'not guilty' plea. [Image credit: M86 Security Labs]