Knowledge (XXG)

Clickbot.A

Source 📝

953: 230: 421: 256: 351: 822: 309: 45:
in May 2006. At that time, the botnet had infected about 100 machines. The infected population grew to over 100,000 machines within one month.
994: 149: 223: 433: 361: 693: 532: 261: 251: 216: 325: 987: 448: 428: 624: 107: 698: 458: 97: 765: 724: 473: 1023: 1018: 1013: 791: 786: 377: 356: 980: 781: 755: 496: 186: 72: 42: 817: 330: 522: 52:
that was downloaded by IE users. It operated by using victims' computers to automatically click on
588: 174: 34: 293: 155: 56: 614: 609: 646: 604: 506: 416: 346: 145: 102: 49: 964: 501: 382: 137: 438: 905: 567: 547: 527: 517: 198: 173:
Daswani, Niel; Stoppelman, Michael; the Google Click Quality and Security Teams (2007).
931: 874: 838: 634: 453: 38: 1007: 895: 677: 542: 468: 92: 53: 159: 869: 640: 557: 552: 403: 879: 843: 740: 562: 491: 411: 87: 27: 463: 388: 287: 82: 141: 921: 900: 952: 128:
Walgampaya, Chamila; Kantardzic, Mehmed (2011). "Cracking the Smart Click
926: 853: 812: 760: 672: 572: 443: 960: 745: 657: 208: 796: 537: 483: 134:
2011 13th IEEE International Symposium on Web Systems Evolution (WSE)
77: 23: 750: 703: 708: 212: 62:
It is also used to steal passwords from unsuspecting users.
968: 914: 888: 862: 831: 805: 774: 733: 717: 686: 665: 656: 623: 597: 581: 482: 402: 370: 339: 318: 302: 280: 273: 988: 224: 8: 995: 981: 662: 277: 231: 217: 209: 310:Sony BMG copy protection rootkit scandal 120: 194: 184: 7: 949: 947: 48:The bot was written as a plugin to 967:. You can help Knowledge (XXG) by 14: 951: 33:The bot was first discovered by 1: 641:Kaminsky DNS cache poisoning 385:(findings published in 2010) 175:"The Anatomy of Clickbot.A" 1040: 946: 244: 108:Zombie (computer science) 142:10.1109/WSE.2011.6081830 98:Trojan horse (computing) 362:US military cyberattack 352:Cyberattacks on Georgia 326:Cyberattacks on Estonia 57:Internet advertisements 963:-related article is a 357:Sarah Palin email hack 497:Jeanson James Ancheta 73:Browser Helper Object 43:Internet Storm Center 331:Operation: Bot Roast 239:Hacking in the 2000s 136:. pp. 125–134. 294:Operation Firewall 197:has generic name ( 976: 975: 944: 943: 940: 939: 422:associated events 398: 397: 347:Project Chanology 268: 267: 151:978-1-4577-0700-1 103:ZeroAccess botnet 50:Internet Explorer 26:that is used for 1031: 997: 990: 983: 955: 948: 663: 514:str0ke (milw0rm) 383:Operation Aurora 278: 247: 246: 233: 226: 219: 210: 203: 202: 196: 192: 190: 182: 170: 164: 163: 125: 1039: 1038: 1034: 1033: 1032: 1030: 1029: 1028: 1004: 1003: 1002: 1001: 945: 936: 910: 884: 858: 827: 801: 770: 729: 713: 694:Anna Kournikova 682: 652: 627: 625:Vulnerabilities 619: 593: 577: 568:Dmitry Sklyarov 548:Albert Gonzalez 478: 394: 366: 335: 314: 298: 269: 240: 237: 207: 206: 193: 183: 172: 171: 167: 152: 127: 126: 122: 117: 112: 68: 17: 16:Computer botnet 12: 11: 5: 1037: 1035: 1027: 1026: 1021: 1016: 1006: 1005: 1000: 999: 992: 985: 977: 974: 973: 956: 942: 941: 938: 937: 935: 934: 929: 924: 918: 916: 912: 911: 909: 908: 903: 898: 892: 890: 886: 885: 883: 882: 880:Black Energy 1 877: 872: 866: 864: 860: 859: 857: 856: 851: 846: 841: 835: 833: 829: 828: 826: 825: 820: 815: 809: 807: 803: 802: 800: 799: 794: 789: 784: 778: 776: 772: 771: 769: 768: 763: 758: 753: 748: 743: 737: 735: 731: 730: 728: 727: 721: 719: 715: 714: 712: 711: 706: 701: 696: 690: 688: 684: 683: 681: 680: 675: 669: 667: 660: 654: 653: 651: 650: 644: 638: 635:Shatter attack 631: 629: 621: 620: 618: 617: 612: 607: 601: 599: 598:Hacking forums 595: 594: 592: 591: 585: 583: 579: 578: 576: 575: 570: 565: 560: 555: 550: 545: 540: 535: 530: 525: 520: 515: 512: 509: 504: 499: 494: 488: 486: 480: 479: 477: 476: 471: 466: 461: 456: 454:PLA Unit 61398 451: 446: 441: 436: 431: 426: 425: 424: 414: 408: 406: 400: 399: 396: 395: 393: 392: 386: 380: 378:Operation Troy 374: 372: 368: 367: 365: 364: 359: 354: 349: 343: 341: 337: 336: 334: 333: 328: 322: 320: 316: 315: 313: 312: 306: 304: 300: 299: 297: 296: 291: 284: 282: 275: 271: 270: 266: 265: 259: 254: 245: 242: 241: 238: 236: 235: 228: 221: 213: 205: 204: 181:. Google, Inc. 179:USENIX Hotbots 165: 150: 119: 118: 116: 113: 111: 110: 105: 100: 95: 90: 85: 80: 75: 69: 67: 64: 15: 13: 10: 9: 6: 4: 3: 2: 1036: 1025: 1024:Malware stubs 1022: 1020: 1019:Trojan horses 1017: 1015: 1014:Internet bots 1012: 1011: 1009: 998: 993: 991: 986: 984: 979: 978: 972: 970: 966: 962: 957: 954: 950: 933: 930: 928: 925: 923: 920: 919: 917: 913: 907: 904: 902: 899: 897: 894: 893: 891: 887: 881: 878: 876: 873: 871: 868: 867: 865: 861: 855: 852: 850: 847: 845: 842: 840: 837: 836: 834: 830: 824: 821: 819: 816: 814: 811: 810: 808: 804: 798: 795: 793: 790: 788: 785: 783: 780: 779: 777: 773: 767: 764: 762: 759: 757: 754: 752: 749: 747: 744: 742: 739: 738: 736: 732: 726: 723: 722: 720: 716: 710: 707: 705: 702: 700: 697: 695: 692: 691: 689: 685: 679: 676: 674: 671: 670: 668: 664: 661: 659: 655: 648: 645: 642: 639: 636: 633: 632: 630: 626: 622: 616: 613: 611: 608: 606: 603: 602: 600: 596: 590: 587: 586: 584: 580: 574: 571: 569: 566: 564: 561: 559: 556: 554: 551: 549: 546: 544: 541: 539: 536: 534: 531: 529: 526: 524: 521: 519: 516: 513: 510: 508: 505: 503: 500: 498: 495: 493: 490: 489: 487: 485: 481: 475: 472: 470: 469:World of Hell 467: 465: 462: 460: 457: 455: 452: 450: 447: 445: 442: 440: 437: 435: 432: 430: 427: 423: 420: 419: 418: 415: 413: 410: 409: 407: 405: 401: 390: 387: 384: 381: 379: 376: 375: 373: 369: 363: 360: 358: 355: 353: 350: 348: 345: 344: 342: 338: 332: 329: 327: 324: 323: 321: 317: 311: 308: 307: 305: 301: 295: 292: 289: 286: 285: 283: 279: 276: 272: 264: → 263: 260: 258: 255: 253: 250:←  249: 248: 243: 234: 229: 227: 222: 220: 215: 214: 211: 200: 188: 180: 176: 169: 166: 161: 157: 153: 147: 143: 139: 135: 131: 124: 121: 114: 109: 106: 104: 101: 99: 96: 94: 93:Download.ject 91: 89: 86: 84: 81: 79: 76: 74: 71: 70: 65: 63: 60: 58: 55: 54:pay-per-click 51: 46: 44: 40: 36: 31: 29: 25: 21: 969:expanding it 958: 848: 823:Sony rootkit 589:Bluehell IRC 558:Dan Kaminsky 553:Sven Jaschan 195:|last3= 187:cite journal 178: 168: 133: 129: 123: 61: 47: 35:Swa Frantzen 32: 19: 18: 741:SQL Slammer 563:Samy Kamkar 484:Individuals 449:Level Seven 412:Ac1db1tch3z 391:(2008–2010) 290:(2003–2006) 88:Click fraud 28:click fraud 1008:Categories 628:discovered 615:darksun.ws 610:unkn0wn.eu 518:Lil Hacker 464:ShadowCrew 389:WebcamGate 288:Titan Rain 115:References 83:Click farm 20:Clickbot.A 922:Conficker 901:Agent.btz 429:Avalanche 417:Anonymous 274:Incidents 927:Koobface 906:Mariposa 854:Stration 849:Clickbot 813:PGPCoder 761:Graybird 699:Code Red 673:ILOVEYOU 647:sslstrip 605:ryan1918 582:Darknets 573:Stakkato 511:Digerati 507:Dshocker 474:Sandworm 444:GhostNet 257:Timeline 160:11092091 66:See also 961:malware 932:Waledac 839:Rustock 766:Blaster 746:Welchia 678:Pikachu 658:Malware 528:camZero 896:Asprox 797:Mydoom 792:Sasser 787:NetSky 725:Simile 649:(2009) 643:(2008) 637:(2002) 543:diabl0 538:Cyxymu 533:Coolio 502:SilenZ 404:Groups 158:  148:  78:Botnet 24:botnet 959:This 870:Storm 782:Bagle 756:Gruel 751:Sobig 704:Nimda 492:AKill 439:0x1fe 262:2010s 252:1990s 156:S2CID 22:is a 965:stub 915:2009 889:2008 875:ZeuS 863:2007 844:ZLOB 832:2006 818:Samy 806:2005 775:2004 734:2003 718:2002 709:Klez 687:2001 666:2000 523:BadB 434:GNAA 371:2009 340:2008 319:2007 303:2005 281:2004 199:help 146:ISBN 39:SANS 459:RBN 138:doi 132:". 130:Bot 37:at 1010:: 191:: 189:}} 185:{{ 177:. 154:. 144:. 59:. 41:' 30:. 996:e 989:t 982:v 971:. 232:e 225:t 218:v 201:) 162:. 140::

Index

botnet
click fraud
Swa Frantzen
SANS
Internet Storm Center
Internet Explorer
pay-per-click
Internet advertisements
Browser Helper Object
Botnet
Click farm
Click fraud
Download.ject
Trojan horse (computing)
ZeroAccess botnet
Zombie (computer science)
doi
10.1109/WSE.2011.6081830
ISBN
978-1-4577-0700-1
S2CID
11092091
"The Anatomy of Clickbot.A"
cite journal
help
v
t
e
1990s
Timeline

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.