ZeroAccess is used by criminals for a variety of scams including forcing machines to visit certain websites and engaging in click fraud through search engines such as Google, Bing and Yahoo, costing advertisers as much as $2.7m a month, Microsoft said.
As such the botnet has been the scourge of the
security community for some time. Last week Microsoft secured a legal
order to block communications between infected machines in the US and 18
IP addresses linked to ZeroAccess. Microsoft has also taken control of
49 domains associated with the botnet.
The action comes soon after Microsoft announced the opening of its dedicated Cybercrime Centre.
David Finn, executive director of the Microsoft Digital Crimes Unit,
said it underlined the efforts the firm would go to disrupt cyber
criminals and their tools.
“The co-ordinated action taken by our partners
was instrumental in the disruption of ZeroAccess; these efforts will
stop victims’ computers from being used for fraud and help us identify
the computers that need to be cleaned of the infection,” he said.
“Microsoft is committed to working
collaboratively – with our customers, partners, academic experts and law
enforcement – to combat cybercrime."
The FBI, which was also involved in the
disruption of the ZeroAccess botnet, said the effort should prove to
criminals that it would not overlook cybercrime in is efforts.
“If the hacker community has not yet taken
notice, today’s disruption of the ZeroAccess botnet is another example
of the power of public-private partnerships,” said Richard McFeely
executive assistant director of the FBI's Criminal, Cyber, Response and
Services Branch.
“It demonstrates our commitment to expand
co-ordination with companies like Microsoft and our foreign law
enforcement partners – in this case, Europol – to shut down malicious
cyber attacks and hold cyber criminals accountable for exploiting our
citizens’ and businesses’ computers.”
Renowned security researcher Brian Krebs said
that while the action would not put ZeroAccess out of action it could
help Microsoft and legal authorities gain more insight into its
behaviours.
“While this effort will not disable the
ZeroAccess botnet (the infected systems will likely remain infected), it
should allow Microsoft to determine which online affiliates and
publishers are associated with the miscreants behind ZeroAccess, since
those publishers will have stopped sending traffic directly after the
takedown occurred,” he said.
The action by Microsoft follows efforts by security vendor Symantec to sink hole an estimated 500,000 machines that had been infected by ZeroAccess. This freed the infected machines from the servers that had been communicating with the malware on their systems.
No comments:
Post a Comment