Virut is a cybercrime malware botnet, operating at least since 2006, and one of the major botnets and malware distributors on the Internet. In January 2013, its operations were disrupted by the Polish organization Naukowa i Akademicka Sieć Komputerowa.

Characteristics

Virut is a malware botnet that is known to be used for cybercrime activities such as DDoS attacks, spam (in collaboration with the Waledac botnet[1]), fraud, data theft, and pay-per-install activities.[2][3][4] It spreads through executable file infection (through infected USB sticks and other media), and more recently, through compromised HTML files (thus infecting vulnerable browsers visiting compromised websites).[2][5] It has infected computers associated with at least 890,000 IP addresses in Poland.[2] In 2012, Symantec estimated that the botnet had control of over 300,000 computers worldwide, primarily in Egypt, Pakistan and Southeast Asia (including India).[2][3] A Kaspersky report listed Virut as the fifth-most widespread threat in the third quarter of 2012, responsible for 5.5% of computer infections.[2][6]

History

The Virut botnet has been active since at least 2006.[2]

On 17 January 2013, Polish research and development organization, data networks operator, and the operator of the Polish ".pl" top-level domain registry, Naukowa i Akademicka Sieć Komputerowa (NASK), took over twenty three domains used by Virut to attempt to shut it down.[2] A NASK spokesperson stated that it was the first time NASK engaged in such an operation (taking over domains), owing to the major threat that the Virut botnet posed to the Internet.[5] It is likely Virut will not be shut down completely, as some of its control servers are located at Russian ".ru" top-level domain name registrars outside the reach of the Polish NASK.[4] Further, the botnet is able to look up alternate backup hosts, enabling the criminals operating it to reestablish control over the network.[4]

See also

References

  1. "Waledac Malware Could Send 3.6 Billion Spam Emails per Day from Infected PCs - Softpedia". News.softpedia.com. 2013-01-15. Retrieved 2013-01-19.
  2. 1 2 3 4 5 6 7 "CERT Polska » Blog Archive » NASK shuts down dangerous Virut botnet domains". Cert.pl. Archived from the original on 2013-01-21. Retrieved 2013-01-19.
  3. 1 2 "Snapshot of Virut Botnet After Interruption | Symantec Connect Community". Symantec.com. 2013-01-07. Retrieved 2013-01-19.
  4. 1 2 3 "Polish Takedown Targets 'Virut' Botnet — Krebs on Security". Krebsonsecurity.com. 2013-01-07. Retrieved 2013-01-19.
  5. 1 2 "•• Przejęto niebezpieczne domeny botnetu Virut | NASK odnosi sukces w walce z cyberzagrożeniami |". Komputerswiat.pl. 1972-02-08. Retrieved 2013-01-19.
  6. "Kaspersky Security Bulletin 2012. The overall statistics for 2012". Securelist. 2012-12-10. Retrieved 2020-05-19.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.