Common Information
Type | Value |
---|---|
Value |
Botnet - T1583.005 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may buy, lease, or rent a network of compromised systems that can be used during targeting. A botnet is a network of compromised systems that can be instructed to perform coordinated tasks.(Citation: Norton Botnet) Adversaries may purchase a subscription to use an existing botnet from a booter/stresser service. With a botnet at their disposal, adversaries may perform follow-on activity such as large-scale [Phishing](https://attack.mitre.org/techniques/T1566) or Distributed Denial of Service (DDoS).(Citation: Imperva DDoS for Hire)(Citation: Krebs-Anna)(Citation: Krebs-Bazaar)(Citation: Krebs-Booter) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2011-11-09 | 23 | Operation Ghost Click: DNSChanger Malware Ring Dismantled | ||
Details | Website | 2011-10-26 | 0 | Worm wriggles through year-old flaw, builds zombie-net | ||
Details | Website | 2011-10-24 | 34 | APT Dot Gov: Protecting Federal Systems from Advanced Threats | SANS White Paper | ||
Details | Website | 2011-10-19 | 169 | Dirt Jumper DDoS Bot - New versions, New targets | ||
Details | Website | 2011-10-07 | 48 | Rustock samples and analysis links. Rustock.C, E, I, J and other variants | ||
Details | Website | 2011-10-06 | 15 | ZeuS-in-the-Mobile – Facts and Theories | ||
Details | Website | 2011-10-06 | 2 | Fishing For Malware: Tread Softly and Carry A Big Net | ||
Details | Website | 2011-09-30 | 2 | Rustock: civil case closed - Microsoft Security Blog | ||
Details | Website | 2011-09-29 | 2 | Mac "Trojans" this past weekend. OSX.Revir-1 | ||
Details | Website | 2011-09-26 | 0 | The Threat Landscape in Africa & the Internet Governance Forum - Microsoft Security Blog | ||
Details | Website | 2011-09-24 | 0 | Weekly Roundup : Sep 23, 2011 : Rustock Botnet Case Goes to the FBI - Microsoft Security Blog | ||
Details | Website | 2011-09-14 | 8 | Ice IX: not cool at all | ||
Details | Website | 2011-09-14 | 27 | TDSS + Bitcoin = ? | ||
Details | Website | 2011-09-10 | 0 | Weekly Roundup : Sep 9, 2011 : DigiNotar Reverberations Continue - Microsoft Security Blog | ||
Details | Website | 2011-08-12 | 1 | Weekly Roundup : Aug 12, 2011 : Dissecting a Shady Rat - Microsoft Security Blog | ||
Details | Website | 2011-07-27 | 15 | "Wrong Transaction" Hotel Spam | ||
Details | Website | 2011-07-26 | 2 | SpyEye Trojan defeating online banking defenses | ||
Details | Website | 2011-07-15 | 2 | Do you really trust that certificate? | ||
Details | Website | 2011-07-13 | 0 | Binary C&C Over HTTP | ||
Details | Website | 2011-07-08 | 134 | Take a sample, leave a sample. Mobile malware mini-dump - July 8 Update | ||
Details | Website | 2011-07-05 | 0 | Special Edition Security Intelligence Report: Battling the Rustock Botnet - Microsoft Security Blog | ||
Details | Website | 2011-07-04 | 0 | TDL-4 Indestructible or not??? | ||
Details | Website | 2011-06-27 | 0 | Obama’s Cybersecurity Proposal: One Small Step for Preventing a Data Breach | Radware Blog | ||
Details | Website | 2011-06-16 | 0 | Virus Bulletin :: Botnet rented for online extortion | ||
Details | Website | 2011-06-01 | 161 | Tor security advisory: "relay early" traffic confirmation attack | Tor Project |