ESET: The FBI-led firm of law enforcement officials from around the world, της Interpol και της Europol διέκοψε τη δράση του δικτύου Dorkbot, which included Command and Control servers in Asia, Europe and North America.
Furthermore, the business οδήγησε στην κατάσχεση των domains, στερώντας έτσι στους λειτουργούς του botnet the ability to control their victims' computers.
"We are involved in interceptor operations to make the internet safer and protect our users. In the case of Dorkbot, the ESET we assisted with technical analysis and statistics on malware, as well as domains and internet addresses of botnet C&C servers ""said Jean-Ian Boutin, Malware Researcher at ESET.
The Dorkbot is one Strongly established botnet based on malware Win32 / Dorkbot, which spreads through various ways, such as social media, spam, removable media and exploit kits.
Μόλις εγκατασταθεί στο μηχάνημα, θα προσπαθήσει να αποδιοργανώσει την ομαλή λειτουργία του λογισμικού ασφάλειας εμποδίζοντας την πρόσβαση στους διακομιστές ενημέρωσης και στη συνέχεια θα συνδεθεί με έναν IRC server για να λάβει περαιτέρω commands.
In addition to eavesdropping on popular services like Facebook and Twitter, Dorkbot typically installs code from one of several malware families as soon as it gains control of a particular system. It is worth noting that the installation of Win32 / Kasidet, the malware used to carry out DDoS attacks, also known as the Neutrino bot, and Win32 / Lethic, a well-known spambot, are due to the Dorkbot breaching the systems.
"As we watched thousands of scans every week from almost every part of the world and new samples arrived daily, Dorkbot looked like a target that could be stopped", commented Jean-Ian Boutin.
ESET solutions protect their users from the thousands of Dorkbot variants, along with many other forms of malware that are spread by Dorkbot botnets.
Internet users who believe that their system is potentially infected by Dorkbot can use the free tool from ESET for a full scan.
More information about the Dorkbot and its neutralization are at article by Jean-Ian Boutin at WeLiveSecurity, ESET's official safety blog (and beyond). For continuous updating, stakeholders can follow the #Dorkbot hashtag on social media.