MalwareIntelligence is a site dedicated to research on all matters relating to anti-malware security, criminology computing and information security in general, always from a perspective closely related to the field of intelligence.


Botnet Zeus. Mass propagation of his Trojan. Part Two

The first part could count well above what it is ZeuS, next to a small list of domains and IP addresses involved with the Trojan and useful to block them.

The map below shows information relating to each host infected by ZeuS who is identified through a point. Although at first glance, the information that shows the map can give the impression of inadequate, we must take into account that each node can represent multiple IP addresses or domains hosted on one server, bringing the percentage of equipment Infected power.

Although the list is very small compared with the amount of domains that host to ZeuS, is extremely important for administrators to block them in its network structure to avoid problems of infection. Jpg / pic / timeats. Jpg / bot. Exe Exe @ 32d. Exe Exe / utility / lease / software / update / config. Bin / utility / backup / config. Bin Exe Php Exe Exe / z. Exe Exe / ~ nostr551te/endive/dogi. Exe

92,241,164,198 / ~ cadazeu / testbot / ldr. Exe Exe Exe bin exe bin bin

Furthermore, each of the domains, along with your IP address, represent a breach of infected host or server.

Given that the means of spread and infection employed by ZeuS are, email and technical Drive-by-Download through different exploit where one of the best known is Luckysploit, or sites which are vulnerable to malware implanted kits as ElFiesta; is extremely important to block domains and IP addresses I have outlined.

Related information
Botnet Zeus. Mass propagation of his Trojan. Part ...
Domain List compromised by Zeus
List of IPs compromised by Zeus

0 comentarios:

Post a Comment