• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • March 6th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Security
Malware

Dorkbot and associated Botnets Temporarily Disrupted

December 5th, 2015 Ryan De Souza Malware, Security 0 comments
Dorkbot and associated Botnets Temporarily Disrupted
Share on FacebookShare on Twitter

The world’s most widely proactive malware group Dorkbot and all of its associated Botnets have been disrupted.

This disruption was made possible by the combined efforts of international law enforcement agencies with the support of prominent security and technology companies including Microsoft.

According to Wil van Gemert, the Europol deputy director of operations who was part of the take-down team, the reason behind this operation was that “Botnets like Dorkbot have victimized users worldwide, which is why a global law enforcement team approach working with the private sector is so important.”

If you are unaware about Dorkbot then let us inform you about it.

Dorkbot:

Dorkbot is a malicious malware, which firstly appeared in 2011.

It infects a PC and lets hackers install additional malicious software along with launching DDoS attacks and hack confidential data for sending spam emails.

It utilizes Internet Relay Chat for C&C purposes.

[fullsquaread][/fullsquaread]

Dorkbot is sold as crimeware toolkit called “NgrBot” on cybercrime forums.

NgrBot includes Bot-building kits and also extensive documentation.

The malware is designed to steal credentials and passwords of social media accounts

It also installs malware that can transform infected endpoints into nodes

As per Europol authorities, only in 2013 this malware infected more than 1million computers worldwide across 190 different countries.

Europol works with international partners to target Dorkbot Botnet https://t.co/4F6jGqG9OL @EC3Europol @FBI @DHSgov & more

— Europol (@Europol) December 4, 2015

The command-and-control servers of the malware were “sinkholed” by the team on Dec 3.

However, officials aren’t sure for how long this disruption will be sustained because of the probability of malware developer releasing updated version to new C&C servers.

This is being speculated because previously when the authorities sinkholed the related domains of the malware, it again reemerged and sold on several forums.

The latest campaign to eliminate Dorkbot was conducted with the cooperation of law enforcement agencies from all over the world including the Department of Homeland Security’s Computer Emergency Readiness Team and FBI from the US, the Royal Canadian Mounted Police, Europol and the Interpol.

This is the second joint operation conducted by law enforcement authorities in Europe. In March 2015, cyber police from Germany, Italy, Netherlands and the United Kingdom shut down world’s biggest ever botnets at that time known as Ramnit.

The Ramit malware was so dangerous that according to researchers it compromised more than 3.2 million Microsoft Windows-based PCs. At the time of shutting down the botnet was active in 350,000 computers worldwide.

[src src=”Source” url=”https://www.europol.europa.eu/content/europol-works-international-partners-target-dorkbot-botnet”]Europol[/src] 

  • Tags
  • Botnet
  • Cyber Crime
  • DDOS attacks
  • europe
  • Europol
  • hacking
  • Malware
  • Microsoft
  • security
Facebook Twitter LinkedIn Pinterest
Previous article Chinese Group 'Admin338' Use DropBox To Deliver Their Payload
Next article New Ransomware Exploit Kit Blends with Credential Theft Ability
Ryan De Souza

Ryan De Souza

Ryan is a London-based member of the HackRead's Editorial team. A graduate of Maths and physics with a passion for geopolitics and human rights. Ryan places integrity at the pinnacle of successful journalism and believes this is somewhat lacking in traditional media. Ryan is an educator who balances his time between family, social activism and humanitarian causes and his vice is Football and cars.

Related Posts
Microsoft, FireEye report 3 new malware linked to SolarWinds hackers

Microsoft, FireEye report 3 new malware linked to SolarWinds hackers

Threat actors hijacking Bitbucket and Docker Hub for Monero mining

Threat actors hijacking Bitbucket and Docker Hub for Monero mining

IT Security firm Qualys extorted by Clop gang after data breach

IT Security firm Qualys extorted by Clop gang after data breach

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Microsoft, FireEye report 3 new malware linked to SolarWinds hackers
Cyber Attacks

Microsoft, FireEye report 3 new malware linked to SolarWinds hackers

Threat actors hijacking Bitbucket and Docker Hub for Monero mining
Security

Threat actors hijacking Bitbucket and Docker Hub for Monero mining

Top Russian hacker forums Maza, Verified hacked; data leaked online
Hacking News

Top Russian hacker forums Maza, Verified hacked; data leaked online

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us