Common Information
Type Value
Value
Botnet - T1583.005
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may buy, lease, or rent a network of compromised systems that can be used during targeting. A botnet is a network of compromised systems that can be instructed to perform coordinated tasks.(Citation: Norton Botnet) Adversaries may purchase a subscription to use an existing botnet from a booter/stresser service. With a botnet at their disposal, adversaries may perform follow-on activity such as large-scale [Phishing](https://attack.mitre.org/techniques/T1566) or Distributed Denial of Service (DDoS).(Citation: Imperva DDoS for Hire)(Citation: Krebs-Anna)(Citation: Krebs-Bazaar)(Citation: Krebs-Booter)
Details Published Attributes CTI Title
Details Website 2011-11-09 23 Operation Ghost Click: DNSChanger Malware Ring Dismantled
Details Website 2011-10-26 0 Worm wriggles through year-old flaw, builds zombie-net
Details Website 2011-10-24 34 APT Dot Gov: Protecting Federal Systems from Advanced Threats | SANS White Paper
Details Website 2011-10-19 169 Dirt Jumper DDoS Bot - New versions, New targets
Details Website 2011-10-07 48 Rustock samples and analysis links. Rustock.C, E, I, J and other variants
Details Website 2011-10-06 15 ZeuS-in-the-Mobile – Facts and Theories
Details Website 2011-10-06 2 Fishing For Malware: Tread Softly and Carry A Big Net
Details Website 2011-09-30 2 Rustock: civil case closed - Microsoft Security Blog
Details Website 2011-09-29 2 Mac "Trojans" this past weekend. OSX.Revir-1
Details Website 2011-09-26 0 The Threat Landscape in Africa & the Internet Governance Forum - Microsoft Security Blog
Details Website 2011-09-24 0 Weekly Roundup : Sep 23, 2011 : Rustock Botnet Case Goes to the FBI - Microsoft Security Blog
Details Website 2011-09-14 8 Ice IX: not cool at all
Details Website 2011-09-14 27 TDSS + Bitcoin = ?
Details Website 2011-09-10 0 Weekly Roundup : Sep 9, 2011 : DigiNotar Reverberations Continue - Microsoft Security Blog
Details Website 2011-08-12 1 Weekly Roundup : Aug 12, 2011 : Dissecting a Shady Rat - Microsoft Security Blog
Details Website 2011-07-27 15 "Wrong Transaction" Hotel Spam
Details Website 2011-07-26 2 SpyEye Trojan defeating online banking defenses
Details Website 2011-07-15 2 Do you really trust that certificate?
Details Website 2011-07-13 0 Binary C&C Over HTTP
Details Website 2011-07-08 134 Take a sample, leave a sample. Mobile malware mini-dump - July 8 Update
Details Website 2011-07-05 0 Special Edition Security Intelligence Report: Battling the Rustock Botnet - Microsoft Security Blog
Details Website 2011-07-04 0 TDL-4 Indestructible or not???
Details Website 2011-06-27 0 Obama’s Cybersecurity Proposal: One Small Step for Preventing a Data Breach | Radware Blog
Details Website 2011-06-16 0 Virus Bulletin :: Botnet rented for online extortion
Details Website 2011-06-01 161 Tor security advisory: "relay early" traffic confirmation attack | Tor Project