Epstein Files Full PDF

CLICK HERE
Technopedia Center
PMB University Brochure
Faculty of Engineering and Computer Science
S1 Informatics S1 Information Systems S1 Information Technology S1 Computer Engineering S1 Electrical Engineering S1 Civil Engineering

faculty of Economics and Business
S1 Management S1 Accountancy

Faculty of Letters and Educational Sciences
S1 English literature S1 English language education S1 Mathematics education S1 Sports Education
teknopedia

  • Registerasi
  • Brosur UTI
  • Kip Scholarship Information
  • Performance
Flag Counter
  1. World Encyclopedia
  2. Waledac botnet - Wikipedia
Waledac botnet - Wikipedia
From Wikipedia, the free encyclopedia
Spam email botnet

Waledac, also known by its aliases Waled and Waledpak, was a botnet mostly involved in e-mail spam and malware. In March 2010 the botnet was taken down by Microsoft.[1][2]

Operations

[edit]

Before its eventual takedown, the Waledac botnet consisted of an estimated 70,000–90,000 computers infected with the "Waledac" computer worm.[1] The botnet itself was capable of sending about 1.5 billion spam messages a day, or about 1% of the total global spam volume.[2][3]

On February 25, 2010, Microsoft won a court order which resulted in the temporary cut-off of 277 domain names which were being used as command and control servers for the botnet, effectively crippling a large part of the botnet.[4] However, besides operating through command and control servers the Waledac worm was also capable of operating through peer-to-peer communication between the various botnet nodes, which means that the extent of the damage was difficult to measure.[5] Codenamed 'Operation b49', an investigation was conducted for some months which thereby yielded an end to the 'zombie' computers. More than a million 'zombie' computers were brought out of the garrison of the hackers but still infected.[6]

In early September 2010, Microsoft was granted ownership of the 277 domains used by Waledac to broadcast spam email.[7]

The botnet was particularly active in North America and Europe and India, Japan and China.[8]

See also

[edit]
  • Botnet
  • Internet crime
  • Internet security
  • Command and control (malware)
  • Zombie (computer science)

References

[edit]
  1. ^ a b Goodin, Dan (2010-03-16). "Waledac botnet 'decimated' by MS takedown; Up to 90,000 zombies freed". theregister.co.uk. London, UK: The Register. Retrieved 2014-01-09.
  2. ^ a b Whitney, Lance (2010-02-25). "With legal nod, Microsoft ambushes Waledac botnet | Security - CNET News". News.cnet.com. Retrieved 2010-07-30.
  3. ^ Claburn, Thomas. "Microsoft Decapitates Waledac Botnet". InformationWeek. Retrieved 2010-07-30.
  4. ^ Leyden, John (2010-02-25). "MS uses court order to take out Waledac botnet; Zombie network decapitated. For now". theregister.co.uk. London, UK: The Register. Retrieved 2014-01-09.
  5. ^ "Waledac Botnet - Deployment & Communication Analysis". FortiGuard. 2009-09-30. Archived from the original on 2010-07-27. Retrieved 2010-07-30.
  6. ^ Help Net Security (26 February 2010). "Microsoft cripples the Waledac botnet". Net-security.org. Retrieved 2014-01-09.
  7. ^ Acohido, Byron (2010-09-08). "Microsoft gets legal might to target spamming botnets". USA Today.
  8. ^ "Microsoft goes to court to take down the Waledac botnet". the Guardian. 25 February 2010.

External links

[edit]
  • Technical analysis of the Waledac worm
  • Deprecated link at archive.today (archived 2013-01-02)
  • v
  • t
  • e
Botnets
Notable botnets
  • 3ve
  • Akbot
  • Asprox
  • Bagle
  • BASHLITE
  • Bredolab
  • Cutwail
  • Conficker
  • Donbot
  • Festi
  • Grum
  • Gumblar
  • Kelihos
  • Koobface
  • Kraken
  • Lethic
  • Mariposa
  • Mega-D
  • Mirai
  • Metulji
  • Nitol
  • Rustock
  • Sality
  • Slenfbot
  • Srizbi
  • Storm
  • TDL-4
  • Torpig
  • Virut
  • Vulcanbot
  • Waledac
  • ZeroAccess
  • Zeus
Main articles
  • Browser security
  • Computer virus
  • Computer worm
  • Malbot
  • Internet security
  • Malware
  • Man-in-the-browser
  • Network security
  • Operation: Bot Roast
  • Trojan horse
  • v
  • t
  • e
Hacking in the 2000s
← 1990s
Timeline
2010s →
Incidents
2004
  • Titan Rain (2003–2006)
  • Operation Firewall
2005
  • Sony BMG copy protection rootkit scandal
2007
  • Cyberattacks on Estonia
  • Operation: Bot Roast
2008
  • Project Chanology
  • Cyberattacks on Georgia
  • Sarah Palin email hack
  • US military cyberattack
2009
  • Operation Troy
  • Operation Aurora (findings published in 2010)
  • WebcamGate (2008–2010)
Groups
  • Anonymous
    • associated events
  • Avalanche
  • Crime Boys
  • GNAA
    • Goatse Security
  • Insanity Zine Corp.
  • 0x1fe
  • GhostNet
  • Level Seven
  • Lordz of Kaos
  • PLA Unit 61398
  • Prime Suspectz
  • RBN
  • ShadowCrew
  • World of Hell
  • Sandworm
Individuals
  • AKill
  • Jeanson James Ancheta
  • SilenZ
  • Dshocker
  • Digerati
  • str0ke (milw0rm)
  • Lil Hacker
  • BadB
  • camZero
  • Coolio
  • Cyxymu
  • diabl0
  • Albert Gonzalez
  • Sam Hocevar
  • Sven Jaschan
  • Dan Kaminsky
  • Samy Kamkar
  • Dmitry Sklyarov
  • Stakkato
  • weev
Darknets
  • Bluehell IRC
Hacking forums
  • ryan1918
  • unkn0wn.eu
  • darksun.ws
Vulnerabilities
discovered
  • Shatter attack (2002)
  • Kaminsky DNS cache poisoning (2008)
  • sslstrip (2009)
Malware
2000
  • ILOVEYOU
  • Pikachu
2001
  • Anna Kournikova
  • Code Red
  • Nimda
  • Klez
2002
  • Simile
2003
  • SQL Slammer
  • Welchia
  • Sobig
  • Gruel
  • Graybird
  • Blaster
2004
  • Bagle
  • NetSky
  • Sasser
  • Mydoom
2005
  • PGPCoder
  • Samy
  • Sony rootkit
2006
  • Rustock
  • ZLOB
  • Clickbot
  • Stration
2007
  • Storm
  • ZeuS
  • Black Energy 1
2008
  • Asprox
  • Agent.BTZ
  • Mariposa
2009
  • Conficker
  • Koobface
  • Waledac
Retrieved from "https://teknopedia.ac.id/w/index.php?title=Waledac_botnet&oldid=1321227589"
Categories:
  • Internet security
  • Distributed computing projects
  • Spamming
  • Botnets
  • Hacking in the 2010s
  • Cybercrime in India
Hidden categories:
  • Articles with short description
  • Short description matches Wikidata
  • Webarchive template archiveis links

  • indonesia
  • Polski
  • العربية
  • Deutsch
  • English
  • Español
  • Français
  • Italiano
  • مصرى
  • Nederlands
  • 日本語
  • Português
  • Sinugboanong Binisaya
  • Svenska
  • Українська
  • Tiếng Việt
  • Winaray
  • 中文
  • Русский
Sunting pranala
url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url
Pusat Layanan

UNIVERSITAS TEKNOKRAT INDONESIA | ASEAN's Best Private University
Jl. ZA. Pagar Alam No.9 -11, Labuhan Ratu, Kec. Kedaton, Kota Bandar Lampung, Lampung 35132
Phone: (0721) 702022
Email: pmb@teknokrat.ac.id