Skip to main content

Home/ Information Security/ Group items tagged CIO

Rss Feed Group items tagged

Skeptical Debunker

Microsoft Recruited Top Notch Guns for Waledac Takedown - CIO.com - Business Technology... - 0 views

  • Microsoft revealed on Wednesday that it gained a court order that compelled VeriSign, the .com registry, to remove 277 ".com" names from its rolls, effectively cutting off communication between the Waledac's controllers and their infected machines. The legal action is unprecedented at the domain name level, said Andre' M. DiMino, co-founder of The Shadowserver Foundation, a group that tracks botnets and helped take down Waledac. In June 2009, a federal court ordered the shutdown of 3FN, a rogue ISP supplying connectivity to botnets such as Pushdo and Mega-D, but this appears to be the first major action at the domain-name level. "It's definitely pretty groundbreaking," DiMino said. "To disable and disrupt a botnet at this level is really pulling the weed out by the root." But behind the scenes, Microsoft's legal action was just one component of a synchronized campaign to bring down Waledac. Last year, researchers with the University of Mannheim in Germany and Technical University Vienna in Austria published a research paper showing how it was possible to infiltrate and control the Waledec botnet. They had studied Waledac's complicated peer-to-peer communication mechanism. Microsoft -- which was annoyed by Waledec due to its spamming of Hotmail accounts -- contacted those researchers about two weeks ago to see if they could perform their attack for real, according one of the University of Mannheim researchers, who did not want to be identified. "They asked me if there was also a way besides taking down those domains of redirecting the command-and-control traffic," said the Mannheim researcher. Waledac distributes instructions through command-and-control servers that work with a peer-to-peer system. Led by a researcher who did his bachelor thesis on Waledac, the action began early this week. "This was more or less an aggressive form of what we did before," the Mannheim researcher said. "We disrupted the peer-to-peer layer to redirect traffic not to botmaster servers but to our servers." At the same time, Microsoft's legal efforts brought down domain names that were used to send new instructions to drones. The result has been dramatic: Up to 90 percent of the infected machines, which amount to at least 60,000 computers, are now controlled by researchers, half of which are in the U.S. and Europe and the rest scattered around the globe.
  •  
    Four days ago, top-notch computer security researchers launched an assault on Waledac, a highly sophisticated botnet responsible for spreading spam and malicious software. As of Thursday, more than 60,000 PCs worldwide that have been infected with malicious code are now under the control of researchers, marking the effort one of the most highly successful coordinated against organized cybercrime.
Devid Thomas

informática forense - 1 views

  •  
    Hay dos pasos básicamente involucradas en el proceso de forense digital para el seguimiento de un correo electrónico: encontrar la dirección IP en la sección de encabezado de correo electrónico y luego encontrar la ubicación de la dirección IP. Generalmente, usted no conseguirá la ubicación exacta de la persona que le mando el correo electrónico. Por ejemplo, si alguien en México le envía un correo electrónico con Gmail, la última dirección IP en la sección de cabecera será probablemente la dirección IP pública asignada por ISP a ese usuariocuando ese usuario le mando un correo desde el ISP, que le dará la ubicación aproximada como la cuidad o parte de cuidad o Zona. La razón de la amplia gama es que la dirección IP que un ISP asigna a un usuario particular es normalmente dinámico.Esto significa que, la dirección IP que tenían; cuando el correo electrónico fue enviado y ahora puede ser asignada a un usuario diferente en la región. Esta es la principal razón por la que podría obtener una amplia área geográfica cuando se esté buscando la ubicación de la dirección IP durante forense digital.
Jackie Fields

IT Management Conference & Expo in NYC Oct.14-16 - 0 views

  •  
    http://www.manageit.me ---The greatest minds in IT in 50+ presentations : top industry-leaders: Creator of MySQL Michael "Monty" Widenius, Internet Celebrity Gary Vaynerchuk, Co-Creator of PHP & Zend CTO Zeev Suraski, Richard Sheridan, CEO of Menlo Innovations & Pioneer of Agile eXtreme Programmi...
1 - 3 of 3
Showing 20 items per page