Level 3: The USA is the base of C&C servers of botnets

Level 3 Communications reports that America is the home for more server commands and botnet control, followed by Ukraine, and Russia in second and third place.

us botnet Level 3
Photo, information: TheRegister

The διοίκησης και ελέγχου, χρησιμοποιούνται για για την of botnets, and usually manage to operate for an average of 30 days or so before being stopped by providers, or local police authorities.

Research by Level 3 Communications reports that the servers of they are widely used as botnet command and control servers as they provide reliable network infrastructure.

Let's say that all of these servers are not legal but have been tampered with and used by botnets without their owners knowing it.

"On average, 20 percent of botnets command and control servers are located in North America, while the same percentage come from Ukraine and Russia combined," the study said.PDF].

The United Kingdom has the sixth place on the list, while Australia is not included in the global report attended by 1000 administration and control servers in the first quarter of 2015.

Noteworthy is the fact that 600 from botnets attended by Level 3 used corporate networks.

"It seems uncontrollable that management and control servers have the potential to disrupt business and destroy vital assets and information."

Level 3 describes in its report some of the most recent botnet threats such as the SSHPsychos bot which accounted for 35% of its total s SSH.

This bot has stopped working at Level 3 together with Cisco Talos, which has stopped automated SSH brute-force attacks against Linux servers.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.086 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).