Role of botnet:-

Botnets are basically networks of virus-infected computers that an attacker can manage remotely. They can be used to steal money, take over identities, and perform other crimes. In this case, botnets are potent core-flood virus that allows cyber criminals to filch the valuable personal and financial information of users by recording the user’s unsuspecting every keystroke.

When it came into limelight:-

In an unprecedented action in the fight against cybercrime, the FBI halted an international cyberfraud operation by seizing servers that had infected up to two million PCs with dangerous software.

How the core-flood virus works:-

Once a computer or network of computers has been infected with Coreflood—which can happen when users receive a malicious e-mail attachment—thieves control the virus via remote servers.

Further actions to haul the virus:-

Initially the core-flood botnets were disabled by seizing the prime servers used by hackers. Still the victim’s computer remains infected.

When does the actual action started:-

The Core-flood investigation started in April 2009, after a Connecticut-based company discovered that hundreds of PCs on its networks had been compromised. Before the team took down the Core-flood operation, cyber thieves conducted several fraudulent wire transfers, costing businesses hundreds of thousands of dollars.

Meanwhile:-

Antivirus firms are generating updated signatures to detect and remove Core-flood.

Urge to Microsoft users:-

In order to disinfect the computers from the virus, users are urged to use the antivirus software and keep the windows updated.

For Victimized Computers:-

Victimised Computers that have not been cleaned with anti-virus software updates will continue to connect to the Core-flood botnet servers. When this occurs, we will respond by sending a temporary stop instruction to the virus and notifying the user’s Internet service provider (ISP), who will advise the consumer that their computer is still infected. At no time will we acquire personal information from victim PCs.

Expert’s view on botnets:-

Shawn Henry, executive assistant director of the FBI’s Criminal, Cyber, Response, and Services Branch, stated that botnets and the cybercriminals who use them endanger the nation’s economic security and the reliability of its information infrastructure. Henry stated, “These measures to lessen the threat posed by the Core-flood botnet are the first of their kind and demonstrate our dedication to being innovative and proactive in enhancing the security of the Internet.”

Point to be noted:-

The disinfection process will be as invisible as the Core-flood infection itself for the majority of infected users who are diligent about keeping their anti-virus programs up to date. However, if notification is required, a procedure involving ISPs is in place to ensure it happens.

More about Core-flood virus:-

Only PCs running Microsoft Windows are susceptible to the Core-flood malware. The majority of consumers typically won’t be able to detect whether their machines are infected.

Important steps to be followed:-

  1. Microsoft Automatic updates are ON.
  2. Update and run antivirus on regular basis.
  3. Make sure to run a firewall on the computer.
  4. Make sure that your bank and credit history are not compromised.

Post a comment

Your email address will not be published.

Related Posts