翻訳と辞書
Words near each other
・ Gruiu River (Râul Mic)
・ Gruiu River (Vedea)
・ Gruiu Scurt River
・ Gruiu Ursului River
・ Gruiul Negru River
・ Gruișoara River
・ Gruișoru River
・ Gruița River
・ Grujinci
・ Grulla
・ Grulla Morioka
・ Grulla National Wildlife Refuge
・ Grullo
・ Grullos
・ Grum
Grum botnet
・ Gruma
・ Grumant
・ Grumari
・ Grumba River
・ Grumbach
・ Grumbach (disambiguation)
・ Grumbach (Innerste)
・ Grumbach (surname)
・ Grumbach (Werra)
・ Grumbach Feud
・ Grumbacher
・ Grumbar
・ Grumbates
・ Grumbkow


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Grum botnet : ウィキペディア英語版
Grum botnet
The Grum botnet, also known by its alias Tedroo and Reddyb, was a botnet mostly involved in sending pharmaceutical spam e-mails. Once the world's largest botnet, Grum can be traced back to as early as 2008. At the time of its shutdown in July 2012, Grum was reportedly the world's 3rd largest botnet, responsible for 18% of worldwide spam traffic.
Grum relies on two types of control servers for its operation. One type is used to push configuration updates to the infected computers, and the other is used to tell the botnet what spam emails to send.
In July 2010, the Grum botnet consisted of an estimated 560,000–840,000 computers infected with the Grum rootkit. The botnet alone delivered about 39.9 billion spam messages in March 2010, equating to approximately 26% of the total global spam volume, temporarily making it the world's then-largest botnet. As of late 2010, the botnet seemed to be growing, as its output increased roughly by 51% in comparison to its output in 2009 and early 2010.
It used a panel written in PHP to control the botnet. 〔(【引用サイトリンク】url=http://krebsonsecurity.com/2012/08/inside-the-grum-botnet/ )
==Botnet takedown==
In July 2012, malware intelligence company FireEye published an (analysis ) of the botnet's command and control servers located in the Netherlands, Panama, and Russia. One week following their initial analysis, FireEye researchers reported that the Dutch Colo/ISP soon after seized two secondary servers responsible for sending spam instructions after their existence was made public. Within one day, the Panamanian ISP hosting one of Grum's primary servers followed suit and shut down their server. The cybercriminals behind Grum quickly responded by sending instructions through six newly established servers in Ukraine. FireEye connected with Spamhaus, CERT-GIB, and an anonymous researcher to shut down the remaining six C&C servers, officially knocking down the botnet as of July 19, 2012.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Grum botnet」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.