Explore the latest news and trends  

Keep yourself up to date with one of the following options:

  • Explore more news around Spam/Phishing, Malware/Cyber-attacks and Antivirus
  • Receive news and special offers from SPAMfighter directly in you inbox.
  • Get free tips and tricks from our blog and improve your security when surfing the net.
Go

Kindsight Reveals Most Lively Botnet, ZeroAccess in Q-3-2012

ZeroAccess was the most dynamic botnet detected in Q3-2012, said security firm, Kindsight in its Q3-2012 malware report. The firm declares that almost 2 Million contaminated users are there globally and from them, 685,000 hails from United States only. Potentially an apprehension for business is that these bots replicates human action and form about 140 Million fraud ad-clicks and 260 terabytes of network traffic, per day. Funds can be earned via the most recent trend according to Bitcoin Mining.

As ZeroAccess is classy, so infection could be ranging advertisers $900,000, per day. Kindsight requested an Internet advertising specialist to go through the network traffic produced via an advertising expert to have a glance at the network traffic formed via a 24-hour ZeroAccess behavior analysis, and the expert said that 18 from 140 would have lead to the advertiser paying for the click.

Suggesting about the botnet, Kevin McNamee, Security Architect and Director of Kind Sight Security Labs said: "The ZeroAccess botnet have became the most active botnet we have calculated this year," according to a statement published by darkreading.com on October 30, 2012.

Also, according to the report, the botmasters are running the Blackhole Exploit kit on the malicious websites, and using phishing or spam campaigns to attract victims. Once users lands on a compromised machine, the root kits allow them to drop additionally malware depending on the campaign; Zeus, DNS Changer, Flashback, Cutwail and many others are the botmasters arsenal.

Interesting fact is that the TDL-4 Botnet resulted in following the ZeroAccess in the list of most dynamic botnet in Q3-2012. The root kit-based bot is comparatively surreptitious, concealing within the master boot record of the infected machine and avoiding antivirus applications. TDL-4 is called for deleting contending malware from the machines that it contaminates, and its recent iteration has contaminated approximately 10% of the fortune 500.

Kindsight also says that 13% of home networks in North America are infected with malware, 6.5% of which are tainted with bot malware, root kits, and banking Trojans.

Related article: Kentucky’s Commonwealth Credit Union Members Become Targets of Hoax E-Mail

» SPAMfighter News - 08-11-2012

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next