Microsoft Says It Took Down 94% of TrickBot's Command and Control Servers (zdnet.com) 24
TrickBot survived an initial takedown attempt, but Microsoft and its partners are countering TrickBot operators after every move, taking down any new infrastructure the group is attempting to bring up online. From a report: Last week, a coalition of cyber-security firms led by Microsoft orchestrated a global takedown against TrickBot, one of today's largest malware botnets and cybercrime operations. Even if Microsoft brought down TrickBot infrastructure in the first few days, the botnet survived, and TrickBot operators brought new command and control (C&C) servers online in the hopes of continuing their cybercrime spree. But as several sources in the cyber-security industry told ZDNet last week, everyone expected TrickBot to fight back, and Microsoft promised to continue cracking down against the group in the weeks to come. In an update posted today on its takedown efforts, Microsoft confirmed a second wave of takedown actions against TrickBot. The OS maker said it has slowly chipped away at TrickBot infrastructure over the past week and has taken down 94% of the botnet's C&C servers, including the original servers and new ones brought online after the first takedown.
6% chance of catching the virus (Score:1)
Re: 6% chance of catching the virus (Score:1)
How does Microsoft take down their servers? (Score:2)
Re: (Score:3)
Re: (Score:2)
Funny Did not know Windows Update can install Linux ;) Maybe Windows is getting better
TrickBot is a Windows OS Trojan . . . Linux is of no use to them.
Re: (Score:3)
Of course, here's the MSI (Score:2)
> Funny Did not know Windows Update can install Linux ;)
Sure it can. It uses this kernel update MSI:
https://wslstorestorage.blob.c... [windows.net]
For updating the Linux user land, you use the Windows Store:
https://www.microsoft.com/en-u... [microsoft.com]
> Maybe Windows is getting better
Maybe so.
Windows updates to Windows defender (Score:2)
Seven steps (Score:2)
1. Microsoft leads group of companies fighting malware. They couldn't do it alone.
2. Microsoft proves in court that the botnet operators are bad guys - it's not a good-faith business disagreement.
3. Microsoft proves the botnet operators are unlawfully harming Microsoft, such as by spoofing O365 login pages.
4. Because bad guys are doing illegal harm to Microsoft, the court grants a court order to shut down the evil botnet.
5. Microsoft and partners track down the command and control servers, such as by having
Re: (Score:1)
Bill goes to all the noobs and asks to install monthly windows update.
I thought ... (Score:2)
...the internet was built exactly to ignore such switchoffs, even nuclear ones.
They're running patches on people's computers (Score:2)
Still need non-cyber attacks (Score:2)
Re: (Score:2)
Why the hate on Mitnick? He's making a good living telling people how to secure their systems, how to avoid being the human point of failure in your corporate security.
Do you somehow imagine Trickbotnet is Mitnick's baby? Or are you just "I've heard that this guy is a Bad Hombre"?
Re: (Score:2)
Mitnick should not be allowed to ever touch a computer again.
It's cool, he can just whistle the nuclear codes into a payphone.
Backlash (Score:2)
Like weeds, 95% is temporary (Score:2)
I will be _very_ surprised if these abusers do not rebuild their botnet fairly quickly. Like eliminating most of a cancer or eliminating most weeds, it often leaves fertile ground behind for the next invasive organism to occupy the same location and use the same resources.