Hacker Syndicate Iranian Cyber Army Focuses on Making Money Only
A hackers' group called the Iranian Cyber Army is reportedly doing business solely for making money. The group that infiltrated Baidu the Chinese search engine and Twitter during December 2009 and the European website of TechCrunch in September 2010 is apparently providing its services for sale in black on the underground cyber-crime world too. Aolnews.com reported this on October 25, 2010.
Say the researchers at Seculert a security firm, they've tracked down the malevolent server that's leveraging the attacks as well as found signs of the Iranian Cyber Army operating a botnet.
Enlightening on the whole event, co-founder and CTO of Seculert stated that the firm discovered one administration interface for anyone who wished for hiring the botnet and so describe what computers they'd wanted to contaminate, while load their own malicious software, which the botnet would distribute. Computerworld.co.nz published this on October 26, 2010. Seculert had a cloud-based facility, which warned its customers of any fresh exploits, malware as also other online dangers, Raff said.
According to him, one required telling the number of computers along with their region following which he required giving the URL for the malware download, which the hackers' group would eventually install on that person's behalf.
The Iranian Cyber Army leverages malware for its operations; therefore around 400,000 computers were loaded with its exploits, Seculert posted on its blog that SCMagazineUs.com reported on October 25, 2010. However, that number was likely to surpass 20m.
The blog-post further stated that at the time of determining the numbers, Seculert's researchers found that occasionally the counter was set afresh, implying that the real count of contaminated computers were sure to be much higher. However, the issue more relevant was to what activity exactly the Iranian group would put such power to.
According to Raff, he wasn't sure about the botnet's final objective, but presently it was being used for money.
He concluded that the period in which the botnet emerged coincided with Stuxnet's predominance in conquering control servers located in Iran, and this was interesting. Consequently, the Cyber Army might fast utilize its botnet as an instrument to take revenge.
Related article: Hacker & Virus in MySpace
» SPAMfighter News - 11/3/2010
We are happy to see you are reading our IT Security News.
We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!