On March 23, Microsoft, FS-ISAC and NACHA – escorted by the U.S. Marshals – successfully executed a coordinated physical seizure of command and control servers in two hosting locations to seize and preserve valuable data and virtual evidence from the botnets for the case. We took down two IP addresses behind the Zeus ‘command and control’ structure. Microsoft also currently monitors 800 domains secured in the operation, which helps us to identify thousands of Zeus-infected computers.
Msg#: 4433478 posted 1:44 pm on Mar 26, 2012 (gmt 0)
When you step on a roach you can be assured there are many more to step on.
I do wish they didn't publicize their efforts because it doesn't deter the type that launch botnets, it encourages them and they improve more quickly. Inventing catch phrases like "command and control" makes it worse.
Msg#: 4433478 posted 9:28 pm on Mar 29, 2012 (gmt 0)
Command and control.. seize and preserve...
They lost it.
I've attended Microsoft SQL Server 2012 launch. oh, for about 10 minutes. They've been running a commercial, A COMMERCIAL WITH MILITARY AND KIDNAPPING... and how great MS is going to sell their DB to the law enforcements. In the end they say sometihng "now we command you to do it!". We got up and left right there, them globalist sold-outs. Go command someone else, "command and control....", peh.
netmeg, I wish they'd fix the windows to start blocking botnets, and I wish they'd get a botnet that's getting me.