Knowledge (XXG)

Waledac botnet

Source 📝

77:
communication between the various botnet nodes, which means that the extent of the damage was difficult to measure. Codenamed 'Operation b49', an investigation was conducted for some months which thereby yielded an end to the 'zombie' computers. More than a million 'zombie' computers were brought out
73:
servers for the botnet, effectively crippling a large part of the botnet. However, besides operating through command and control servers the Waledac worm was also capable of operating through
326: 640: 831: 666: 761: 1232: 719: 1371: 633: 843: 771: 363: 1103: 942: 58:. The botnet itself was capable of sending about 1.5 billion spam messages a day, or about 1% of the total global spam volume. 54:
Before its eventual takedown, the Waledac botnet consisted of an estimated 70,000–90,000 computers infected with the "Waledac"
194: 306: 1386: 671: 661: 626: 331: 112: 1391: 735: 1366: 858: 838: 1034: 117: 1108: 868: 607: 1175: 1134: 883: 1201: 1196: 787: 766: 1191: 1165: 906: 401: 356: 1227: 740: 602: 140: 932: 288: 70: 998: 703: 592: 1024: 1019: 216: 1376: 1056: 1014: 916: 826: 756: 582: 541: 107: 1381: 911: 792: 597: 562: 349: 848: 88:
The botnet was particularly active in North America and Europe and India, Japan and China.
1315: 977: 957: 937: 927: 476: 466: 411: 244: 1284: 1248: 1044: 863: 567: 546: 491: 481: 446: 416: 102: 1360: 1305: 1087: 952: 878: 572: 506: 471: 461: 456: 426: 396: 335: 217:"MS uses court order to take out Waledac botnet; Zombie network decapitated. For now" 55: 172: 1279: 1050: 967: 962: 813: 577: 511: 486: 431: 266: 224: 148: 74: 85:
was granted ownership of the 277 domains used by Waledac to broadcast spam email.
332:
Is the infamous Waledac botnet out of the picture or not? | TechRepublic.com
1289: 1253: 1150: 972: 901: 821: 436: 66: 35: 173:"With legal nod, Microsoft ambushes Waledac botnet | Security - CNET News" 1258: 873: 798: 697: 1331: 1310: 531: 421: 82: 62: 43: 1336: 1263: 1222: 1170: 1082: 982: 853: 501: 451: 406: 1155: 1067: 618: 587: 441: 141:"Waledac botnet 'decimated' by MS takedown; Up to 90,000 zombies freed" 39: 1206: 947: 893: 521: 496: 372: 97: 31: 1160: 1113: 526: 516: 391: 65:
won a court order which resulted in the temporary cut-off of 277
1118: 622: 345: 386: 134: 132: 341: 245:"Waledac Botnet - Deployment & Communication Analysis" 307:"Microsoft goes to court to take down the Waledac botnet" 289:"Microsoft gets legal might to target spamming botnets" 78:of the garrison of the hackers but still infected. 1324: 1298: 1272: 1241: 1215: 1184: 1143: 1127: 1096: 1075: 1066: 1033: 1007: 991: 892: 812: 780: 749: 728: 712: 690: 683: 555: 379: 634: 357: 42:. In March 2010 the botnet was taken down by 8: 1072: 687: 641: 627: 619: 364: 350: 342: 720:Sony BMG copy protection rootkit scandal 267:"Microsoft cripples the Waledac botnet" 128: 327:Technical analysis of the Waledac worm 265:Help Net Security (26 February 2010). 195:"Microsoft Decapitates Waledac Botnet" 166: 164: 7: 14: 1372:Distributed computing projects 1: 287:Acohido, Byron (2010-09-08). 171:Whitney, Lance (2010-02-25). 113:Command and control (malware) 1051:Kaminsky DNS cache poisoning 795:(findings published in 2010) 22:, also known by its aliases 215:Leyden, John (2010-02-25). 1408: 338: (archived 2013-01-02) 139:Goodin, Dan (2010-03-16). 654: 118:Zombie (computer science) 81:In early September 2010, 69:which were being used as 247:. FortiGuard. 2009-09-30 772:US military cyberattack 762:Cyberattacks on Georgia 736:Cyberattacks on Estonia 767:Sarah Palin email hack 61:On February 25, 2010, 907:Jeanson James Ancheta 1387:Hacking in the 2010s 741:Operation: Bot Roast 649:Hacking in the 2000s 603:Operation: Bot Roast 1392:Cybercrime in India 313:. 25 February 2010. 71:command and control 34:mostly involved in 704:Operation Firewall 593:Man-in-the-browser 269:. Net-security.org 1367:Internet security 1354: 1353: 1350: 1349: 832:associated events 808: 807: 757:Project Chanology 678: 677: 616: 615: 583:Internet security 221:theregister.co.uk 197:. InformationWeek 193:Claburn, Thomas. 145:theregister.co.uk 108:Internet security 16:Spam email botnet 1399: 1073: 924:str0ke (milw0rm) 793:Operation Aurora 688: 657: 656: 643: 636: 629: 620: 598:Network security 563:Browser security 366: 359: 352: 343: 315: 314: 303: 297: 296: 284: 278: 277: 275: 274: 262: 256: 255: 253: 252: 241: 235: 234: 232: 231: 212: 206: 205: 203: 202: 190: 184: 183: 181: 180: 168: 159: 158: 156: 155: 136: 1407: 1406: 1402: 1401: 1400: 1398: 1397: 1396: 1357: 1356: 1355: 1346: 1320: 1294: 1268: 1237: 1211: 1180: 1139: 1123: 1104:Anna Kournikova 1092: 1062: 1037: 1035:Vulnerabilities 1029: 1003: 987: 978:Dmitry Sklyarov 958:Albert Gonzalez 888: 804: 776: 745: 724: 708: 679: 650: 647: 617: 612: 551: 380:Notable botnets 375: 370: 323: 318: 305: 304: 300: 286: 285: 281: 272: 270: 264: 263: 259: 250: 248: 243: 242: 238: 229: 227: 214: 213: 209: 200: 198: 192: 191: 187: 178: 176: 175:. News.cnet.com 170: 169: 162: 153: 151: 138: 137: 130: 126: 94: 52: 17: 12: 11: 5: 1405: 1403: 1395: 1394: 1389: 1384: 1379: 1374: 1369: 1359: 1358: 1352: 1351: 1348: 1347: 1345: 1344: 1339: 1334: 1328: 1326: 1322: 1321: 1319: 1318: 1313: 1308: 1302: 1300: 1296: 1295: 1293: 1292: 1290:Black Energy 1 1287: 1282: 1276: 1274: 1270: 1269: 1267: 1266: 1261: 1256: 1251: 1245: 1243: 1239: 1238: 1236: 1235: 1230: 1225: 1219: 1217: 1213: 1212: 1210: 1209: 1204: 1199: 1194: 1188: 1186: 1182: 1181: 1179: 1178: 1173: 1168: 1163: 1158: 1153: 1147: 1145: 1141: 1140: 1138: 1137: 1131: 1129: 1125: 1124: 1122: 1121: 1116: 1111: 1106: 1100: 1098: 1094: 1093: 1091: 1090: 1085: 1079: 1077: 1070: 1064: 1063: 1061: 1060: 1054: 1048: 1045:Shatter attack 1041: 1039: 1031: 1030: 1028: 1027: 1022: 1017: 1011: 1009: 1008:Hacking forums 1005: 1004: 1002: 1001: 995: 993: 989: 988: 986: 985: 980: 975: 970: 965: 960: 955: 950: 945: 940: 935: 930: 925: 922: 919: 914: 909: 904: 898: 896: 890: 889: 887: 886: 881: 876: 871: 866: 864:PLA Unit 61398 861: 856: 851: 846: 841: 836: 835: 834: 824: 818: 816: 810: 809: 806: 805: 803: 802: 796: 790: 788:Operation Troy 784: 782: 778: 777: 775: 774: 769: 764: 759: 753: 751: 747: 746: 744: 743: 738: 732: 730: 726: 725: 723: 722: 716: 714: 710: 709: 707: 706: 701: 694: 692: 685: 681: 680: 676: 675: 669: 664: 655: 652: 651: 648: 646: 645: 638: 631: 623: 614: 613: 611: 610: 605: 600: 595: 590: 585: 580: 575: 570: 568:Computer virus 565: 559: 557: 553: 552: 550: 549: 544: 539: 534: 529: 524: 519: 514: 509: 504: 499: 494: 489: 484: 479: 474: 469: 464: 459: 454: 449: 444: 439: 434: 429: 424: 419: 414: 409: 404: 399: 394: 389: 383: 381: 377: 376: 371: 369: 368: 361: 354: 346: 340: 339: 329: 322: 321:External links 319: 317: 316: 298: 279: 257: 236: 223:. London, UK: 207: 185: 160: 147:. London, UK: 127: 125: 122: 121: 120: 115: 110: 105: 103:Internet crime 100: 93: 90: 51: 48: 15: 13: 10: 9: 6: 4: 3: 2: 1404: 1393: 1390: 1388: 1385: 1383: 1380: 1378: 1375: 1373: 1370: 1368: 1365: 1364: 1362: 1343: 1340: 1338: 1335: 1333: 1330: 1329: 1327: 1323: 1317: 1314: 1312: 1309: 1307: 1304: 1303: 1301: 1297: 1291: 1288: 1286: 1283: 1281: 1278: 1277: 1275: 1271: 1265: 1262: 1260: 1257: 1255: 1252: 1250: 1247: 1246: 1244: 1240: 1234: 1231: 1229: 1226: 1224: 1221: 1220: 1218: 1214: 1208: 1205: 1203: 1200: 1198: 1195: 1193: 1190: 1189: 1187: 1183: 1177: 1174: 1172: 1169: 1167: 1164: 1162: 1159: 1157: 1154: 1152: 1149: 1148: 1146: 1142: 1136: 1133: 1132: 1130: 1126: 1120: 1117: 1115: 1112: 1110: 1107: 1105: 1102: 1101: 1099: 1095: 1089: 1086: 1084: 1081: 1080: 1078: 1074: 1071: 1069: 1065: 1058: 1055: 1052: 1049: 1046: 1043: 1042: 1040: 1036: 1032: 1026: 1023: 1021: 1018: 1016: 1013: 1012: 1010: 1006: 1000: 997: 996: 994: 990: 984: 981: 979: 976: 974: 971: 969: 966: 964: 961: 959: 956: 954: 951: 949: 946: 944: 941: 939: 936: 934: 931: 929: 926: 923: 920: 918: 915: 913: 910: 908: 905: 903: 900: 899: 897: 895: 891: 885: 882: 880: 879:World of Hell 877: 875: 872: 870: 867: 865: 862: 860: 857: 855: 852: 850: 847: 845: 842: 840: 837: 833: 830: 829: 828: 825: 823: 820: 819: 817: 815: 811: 800: 797: 794: 791: 789: 786: 785: 783: 779: 773: 770: 768: 765: 763: 760: 758: 755: 754: 752: 748: 742: 739: 737: 734: 733: 731: 727: 721: 718: 717: 715: 711: 705: 702: 699: 696: 695: 693: 689: 686: 682: 674: → 673: 670: 668: 665: 663: 660:←  659: 658: 653: 644: 639: 637: 632: 630: 625: 624: 621: 609: 606: 604: 601: 599: 596: 594: 591: 589: 586: 584: 581: 579: 576: 574: 573:Computer worm 571: 569: 566: 564: 561: 560: 558: 556:Main articles 554: 548: 545: 543: 540: 538: 535: 533: 530: 528: 525: 523: 520: 518: 515: 513: 510: 508: 505: 503: 500: 498: 495: 493: 490: 488: 485: 483: 480: 478: 475: 473: 470: 468: 465: 463: 460: 458: 455: 453: 450: 448: 445: 443: 440: 438: 435: 433: 430: 428: 425: 423: 420: 418: 415: 413: 410: 408: 405: 403: 400: 398: 395: 393: 390: 388: 385: 384: 382: 378: 374: 367: 362: 360: 355: 353: 348: 347: 344: 337: 336:archive.today 333: 330: 328: 325: 324: 320: 312: 308: 302: 299: 294: 290: 283: 280: 268: 261: 258: 246: 240: 237: 226: 222: 218: 211: 208: 196: 189: 186: 174: 167: 165: 161: 150: 146: 142: 135: 133: 129: 123: 119: 116: 114: 111: 109: 106: 104: 101: 99: 96: 95: 91: 89: 86: 84: 79: 76: 72: 68: 64: 59: 57: 56:computer worm 49: 47: 45: 41: 37: 33: 29: 25: 21: 1341: 1233:Sony rootkit 999:Bluehell IRC 968:Dan Kaminsky 963:Sven Jaschan 608:Trojan horse 536: 311:the Guardian 310: 301: 292: 282: 271:. Retrieved 260: 249:. Retrieved 239: 228:. Retrieved 225:The Register 220: 210: 199:. Retrieved 188: 177:. Retrieved 152:. Retrieved 149:The Register 144: 87: 80: 75:peer-to-peer 67:domain names 60: 53: 27: 23: 19: 18: 1151:SQL Slammer 973:Samy Kamkar 894:Individuals 859:Level Seven 822:Ac1db1tch3z 801:(2008–2010) 700:(2003–2006) 36:e-mail spam 1361:Categories 1038:discovered 1025:darksun.ws 1020:unkn0wn.eu 928:Lil Hacker 874:ShadowCrew 799:WebcamGate 698:Titan Rain 542:ZeroAccess 273:2014-01-09 251:2010-07-30 230:2014-01-09 201:2010-07-30 179:2010-07-30 154:2014-01-09 124:References 50:Operations 1332:Conficker 1311:Agent.btz 839:Avalanche 827:Anonymous 684:Incidents 532:Vulcanbot 422:Conficker 293:USA Today 83:Microsoft 63:Microsoft 44:Microsoft 1377:Spamming 1337:Koobface 1316:Mariposa 1264:Stration 1259:Clickbot 1223:PGPCoder 1171:Graybird 1109:Code Red 1083:ILOVEYOU 1057:sslstrip 1015:ryan1918 992:Darknets 983:Stakkato 921:Digerati 917:Dshocker 884:Sandworm 854:GhostNet 667:Timeline 502:Slenfbot 467:Mariposa 452:Koobface 412:Bredolab 407:BASHLITE 92:See also 30:, was a 28:Waledpak 1382:Botnets 1342:Waledac 1249:Rustock 1176:Blaster 1156:Welchia 1088:Pikachu 1068:Malware 938:camZero 588:Malware 537:Waledac 492:Rustock 482:Metulji 447:Kelihos 442:Gumblar 417:Cutwail 373:Botnets 40:malware 20:Waledac 1306:Asprox 1207:Mydoom 1202:Sasser 1197:NetSky 1135:Simile 1059:(2009) 1053:(2008) 1047:(2002) 953:diabl0 948:Cyxymu 943:Coolio 912:SilenZ 814:Groups 578:Malbot 522:Torpig 507:Srizbi 497:Sality 472:Mega-D 462:Lethic 457:Kraken 427:Donbot 397:Asprox 98:Botnet 32:botnet 1280:Storm 1192:Bagle 1166:Gruel 1161:Sobig 1114:Nimda 902:AKill 849:0x1fe 672:2010s 662:1990s 527:Virut 517:TDL-4 512:Storm 487:Nitol 477:Mirai 432:Festi 402:Bagle 392:Akbot 24:Waled 1325:2009 1299:2008 1285:ZeuS 1273:2007 1254:ZLOB 1242:2006 1228:Samy 1216:2005 1185:2004 1144:2003 1128:2002 1119:Klez 1097:2001 1076:2000 933:BadB 844:GNAA 781:2009 750:2008 729:2007 713:2005 691:2004 547:Zeus 437:Grum 38:and 26:and 869:RBN 387:3ve 334:at 1363:: 309:. 291:. 219:. 163:^ 143:. 131:^ 46:. 642:e 635:t 628:v 365:e 358:t 351:v 295:. 276:. 254:. 233:. 204:. 182:. 157:.

Index

botnet
e-mail spam
malware
Microsoft
computer worm
Microsoft
domain names
command and control
peer-to-peer
Microsoft
Botnet
Internet crime
Internet security
Command and control (malware)
Zombie (computer science)


"Waledac botnet 'decimated' by MS takedown; Up to 90,000 zombies freed"
The Register


"With legal nod, Microsoft ambushes Waledac botnet | Security - CNET News"
"Microsoft Decapitates Waledac Botnet"
"MS uses court order to take out Waledac botnet; Zombie network decapitated. For now"
The Register
"Waledac Botnet - Deployment & Communication Analysis"
"Microsoft cripples the Waledac botnet"
"Microsoft gets legal might to target spamming botnets"
"Microsoft goes to court to take down the Waledac botnet"
Technical analysis of the Waledac worm

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.