Botnets Exploded During 2010
According to Damballa a security company, which released a report on February 15, 2011, fresh botnets emerged in large numbers during 2010.
The report, which based its findings on confirmed infections on the computers of tens-of-millions users within North America, covered trends of weekly increasing botnets all through 2010 and dug into some very newsworthy maliciously run armies of infected PCs.
Said Vice President of Research Gunter Ollmann in Damballa, before 2010, people generally associated botnets with DDoS (distributed denial-of-service) and spam attacks. And towards 2010-end, botnets like Koobface, Mariposa, Stuxnet and Aurora had turned into common names amongst householders, suggesting that the botnet crime very normally received the support of agents who remotely regulated the infected PCs, Ollmann revealed. NetworkWorld reported this on February 15, 2010.
In the meantime, the report discloses that 60% of the total botnets of 2010 were not there during 2009, while just botnet Monkif ranked amongst the ten most prevalent botnets of both 2009 and 2010. RudeWarlockMob, a newly emerging botnet occupied the first spot, accounting for 14.8% of infections, which remarkably drew worldwide attention during the last six months of 2010.
Additionally, botnets FreakySpiderCartel (5.7%), FourLakeRiders (5.3%), WickedRockMonsters (2.2%), and OneStreetTroop (1.9%) were all constructed with well-known toolkits, with the toolkits frequently altered and enhanced all through 2010 as the fraud goals and infection schemes changed for the botnets.
Furthermore, according to the report, all through 2010, the ten biggest botnets contributed for an even more number of bot-contaminated users. At 2010-beginning, about 22% of users, victimized with botnets, contracted malware infection from merely 10 botnet operators. But when 2010 ended, that rate had become a high 57%, contributing to more than twice the overall count of worldwide users who had been infected with botnets.
Eventually, botnets, no matter if they utilize popular methods, alternatively the latest deception techniques, they keep on being the greatest e-threat. And although there are solutions currently for spotting a breach as also destabilizing the criminal interactions, con artists will just launch fresh campaigns. Hence, advanced knowledge is needed about thwarting of botnet campaigns and thereby to beat the threat.
Related article: Botnet Misuses Google Analytics
» SPAMfighter News - 22-02-2011