Posts tagged bot
Windows Intune, in a nutshell, is a Web-based console where IT administrators can manage the deployment of Microsoft updates and service packs to all PCs, keep track of hardware and software inventory, fix PC issues remotely, manage protection from malware threats and set security policies. Windows Intune can be accessed anywhere an Internet connection is available.
Microsoft is aiming the cloud-based Windows Intune squarely at companies with 25 to 500 PCs, as businesses of this size typically don’t have the resources to manage and configure servers in an on-premise desktop management environment.
For $11 per PC per month users will get the Windows Intune service plus integrated anti-malware (anti-virus and anti-spyware) and Windows 7 Enterprise upgrade rights. Volume discounts will also be available for purchases of 250 licenses or greater.
Windows Intune will be sold like other cloud services from Microsoft — through Microsoft partners and the Microsoft Online Services Web site.
You can find more in depth information in the PDF below or just visit windowsintune.com.
The current version of the ZeuS botnet uses classical copy protection mechanisms to prevent the use of unlicensed pirate copies. ZeuS is a malware toolkit used, for instance, to steal online banking data. The basic version currently costs about $3,000 to $4,000.
Security firm SecureWorks has discovered that the ZeuS server only works with a system specific key. Similar to the Windows OS, the malware creates a kind of fingerprint of the respective hardware configuration when first started. The vendor then provides the user with a personalised licence key for this configuration.
The ZeuS server is responsible for controlling the botnet. It communicates with the infected computers – the bots –, it receives the data they provide and issues commands, etc. The client software injected on victims’ systems of course does not require a licence key. Extensive division of labour has existed in the malware scene for some time. Many gangs use the professional ZeuS software which is modular and can – for a fee – be extended to include, for instance, different Windows versions or browsers. By using a licence management system, the product has reached a new level of professionalism.
Just a few seconds after publishing my last post I read about this really ChuckNorris-stuff on a german newspage (I hope you all have humor):
Apparently, when Chuck Norris wants to create a botnet, he’s such a badass that he doesn’t even have to attack computers.
The Chuck Norris virus, so called because of the words “in nome di Chuck Norris,” (Italian for “In the name of Chuck Norris”) in the source code, attacks routers and DSL modems by guessing commonly used passwords. It also exploits a security vulnerability present in many D-Link routers.
This virus, which takes advantage of an incredibly common vulnerability, is potentially incredibly dangerous. Even the most security-minded of consumers will often forget to change the default password on their routers after setting them up. Because this virus can change DNS settings of the router, it can also hijack the browsers of computers on its network, steering them to malware-infested sites or phishing sites.
In addition, due to the widespread use of Linux and MIPS-based chips in internet-connected devices (like routers, modems and even cable boxes), this particular vulnerability could be devastating. According to Jan Vykopal, head of network security research for Masaryk University’s Department of Computer Science (and the discoverer of the virus), devices in Asia, Europe, North and South America are already infected, and it appears to be spreading quickly.
While this particular virus might not become the next conficker, it suggests that similar exploits could be on the way. Despite the fact that many people have antivirus software on their computers, most people completely overlook the security of their routers. It’s only a matter of time before another more effective version of this exploit finds its way into more routers and cable boxes.
How often do we see these visitor-counters getting higher even faster by every new startup that crawls the web about how minimal it’s impact will be?
Every one of them claim it but when you add them all together the bot traffic is quickly exceeding the human traffic.
Who the heck - am I kidding?, on most sites the bots clearly out number the humans in pages read on a daily basis.
First we put the big search engines on top of the heap with Google, Yahoo and MSN crawling the crap out of your servers daily. Just the three of these guys can easily read as many pages as 10K visitors a day. Then Read the rest of this entry »