The 10 most feared 'ghost computer' networks in the world
Statistics show that these 10 ghost computer networks (botnets) are controlling 5 million computers and distributing 135 billion spam every day - accounting for 80% of the current spam volume.
Grum (Tedroo)
Grum is the future for spammy botnets. They work stealthily under the hidden mode of rootkits, infecting the AutoRun registry key to ensure that it is always activated. This botnet is currently receiving special attention from researchers. The number of Grum's distribution programs is currently 600,000 but it accounts for 25% of spam in a day, which spreads to 40 billion spams a day.
Bobax (Kraken / Oderoor / Hacktool.spammer)
Bobax is a new botnet identified with respect to the previous Kraken famous botnet. Recently, Kraken was upgraded to Bobax by switching commands and controlling traffic to the HTTP protocol to make it difficult for users.
According to current statistics, Bobax's distribution program only accounts for 100,000 but it spreads to 27 billion spams a day, accounting for 15% of spam. Thus, it means that every minute it can generate 1400 spam.
Pushdo (Cutwail / PANDEX)
The Botnet is a network of malicious computers infected by hackers who have control, and the victim is unaware.
Hackers will take advantage of exploiting "zombie computers" in their botnets to serve spam, infect malicious code . to profit. Started with the name Storm in 2007, Pushdo has so far grown quite strong and has generated about 19 billion spams a day and owns 500,000 "ghost computers" (controlled due to malicious code). .
Pushdo is a form of downloader malicious code that takes access to victim computers and downloads Cutwail spam software.
This botnet involves spam spills about pharmaceuticals, online casinos and includes phishing activities as well as links to sites containing malware.
Rustock (Costrat)
Rustock was known in 2008 but was quickly eliminated when McColo's "spam-dispenser" was completely destroyed. After a period of quiet silence has returned and became one of the largest botnets with nearly 2 million "ghost computers" as tools for the purpose of attack.
Rustock is also known as spam that uses image files to bypass protection filters. Rustock regularly opens a series of spam litter advertising medical drugs or sends spam messages to Twitter's social network with spam amounting to about 17 billion per day.
Bagle (Beagle / Mitglieder / Lodeight)
The botnet Bagle was born in 2004, but until two years ago, Bagle creators began to bring Bagle botnets to profitability. Currently Bagle has 500,000 "ghost computers" with the number of spam messages posted every day on the Internet at 14 billion.
Mega-D (Ozdok)
In November 2009, researchers at FireEye broke the botnet with command lines as well as controlling domains before botnet owners. But then Mega-D was restructured to be able to continuously create new domain names to help its owners control their activities.
Among the top 10 botnets, Mega-D is the smallest botnet with only 50,000 members. Although the number of "slaves" is small, Mega-D can spread up to 11 billion spams a day. If you consider spam every minute, Mega-D is just behind Bobax.
Maazben
Maazben was discovered and prevented from June 2009. Although Maazben has a number of "ghost computers" of 300,000, compared to other botnets, it provides a low amount of spam messages every day, reaching only 500 million messages.
Xarvester (Rlsloup / Pixoliz)
Xarvester has been formed since McColo was terminated. Researchers discovered that Xarvester has similarities with the infamous botiz Srizbi.
The current statistics of Xarvester contain 60,000 "members" with spam spread throughout the Internet of about 2.5 billion per day.
Donbot (Buzus)
This is one of the first botnets to use the service to shorten URL addresses, one of the best ways for them to hide malicious links in spam to trick users into clicking that malicious link. Donbot has about 100,000 "members" with a daily spam volume of around 800 million.
Gheg (Tofsee / Mondera)
Three highlights of the 10th botnet are: 85% of spam from South Korea, Gheg is one of the few botnets that encrypts bandwidth traffic by commands and controls servers by connecting. not SSL compliant. The third thing is how Gheg chooses proxies to send spam or it can even send spam to the victim's computer via the Internet provider email server.
Gheg currently has 60,000 "ghost computers" with about 400 million spams scattered every day.
You should read it
- How to download Mega Legendary iOS and Android
- Bagle worm is upgraded on victim computer
- How the botnet works
- How ghost Windows 7/8, Windows 10 with OneKey Ghost
- What is ghost win? The way ghost win 10 is simple and fast
- Bagle continues to 'terrorize' the Internet world
- What is a botnet, who does it use to attack, and how can you prevent botnet?
- Deep Bagle-DO: 'I have nude photos of Paris Hilton'
May be interested
- Instructions on how to ghost Windows 7 using USBbesides onekey ghost you can ghost win 7 using usb boot created from hiren's bootcd. below is a detailed guide for you to ghost windows 7.
- Ghost Windows 10 Pro 1909 64 / 32bit Full Soft 2020if your computer has windows 10 problem and you want to reinstall windows, it will be very time consuming. if you choose to ghost, you will only take a few minutes to reinstall your computer. i will share with you 1 ghost windows 10 pro 1909 in the article below
- How to Ghost Windows 11 on computers and laptopsusing onekey ghost or usb boot software are both ways to help us ghost windows 11 on the computer quickly and effectively today, instead of waiting for the installation of win 11 to take time, many operations, the ghost win 11 will save a lot of time for other things.
- Backup and Ghost reinstall Win with Norton ghost from HDDinstalling win in the usual way takes a lot of time. the fastest way is to use norton ghost to ghost back win. can create your own ghost win
- What is Ghost Win? How does it work?during the process of using computers, most users must have heard the concept of ghost win a few times. so what is ghost win? how does it work?
- How to ghost UEFI-GPT standard tib file for computer, laptopghost tib files have much better expansion and completion speed than previous gho files and are shared by many people. do you know how to ghost with tib files?
- Instructions to create Ghost files with Boot diskyou can use ghost to recover your computer quickly without spending time on installing windows and previously installed software.
- Guide Ghost win 7 simple and fast with just a few basic stepswindows 7 is still a popular operating system today because of its stability, lightness and ease of use. therefore, many people often look to the ghost win 7 version to reinstall fastest and most convenient.
- How to ghost Windows 7, ghost Windows 7 32bit 64bit using USBghost win 7 using usb is the fastest way for users to reinstall their operating system. furthermore, with usb ghost windows 7 you can ghost multiple windows 7 computers without having to create ghost sets multiple times.
- How to ghost a computer with a TIB filewhen it comes to ghosts, most people will think of using norton ghost along with gho files. however, in recent years, with the emergence of new platforms, this method has no longer really suited.