The Gupteba botnet that infected 1 million Windows computers has just been taken down by Google
Glopbeta is a dangerous type of malware with the ability to steal user information and cookies, mine virtual currency, deploy and operate proxy components... It usually targets both Windows and device systems. IoT devices.
Google security experts tracked the activities of Glubeta infected victims globally, including countries like the US, India, Brazil, and Southeast Asia. After days of investigation, on December 7, Google announced that it had disrupted a network of millions of Windows computers infected with Gupbeta.
Google said there are at least two individuals in Russia related to the Glutbeta virus transmission chain. At one point, Google identified the Glutbeta network spreading at a fast rate, with nearly 1,000 new infected computers per day.
Glopbeta is often spread by masquerading as freeware, cracked software, cracked games, pirated videos or movies. Therefore, users who like to use cracked software and pirated games are easily trapped.
During the sweep, Google removed 63 million documents and locked 1,100 Google accounts used for the purpose of distributing Glopbeta. However, according to Google, the guys behind Glopbeta use blockchain technology, so their resilience is very respectable.
"Blockchain nature makes botnets recover faster from disruptions. This makes them a lot harder to take down," Google shared.
In addition to these independent efforts, Google is working with multiple parties to find solutions to make the Internet more resistant to attacks by botnets like Glopbeta.
You should read it
- How the botnet works
- What is a botnet, who does it use to attack, and how can you prevent botnet?
- What is botnet DDoS?
- Microsoft has just taken down a huge botnet network
- Microsoft dismantled the ZLoader botnet, naming key members as a deterrent
- GoldBrute botnet campaign is trying to hack 1.5 million RDP servers worldwide
- WireX DDoS Botnet: tens of thousands of Android phones are hacked
- The US warned about DealtaCharlie - DDoS botnet malware from Korea
- The rise of Botnet IoT and how to protect smart devices
- Botnet Echobot spreads across a wide range, specifically targeting Oracle and VMware applications
- Akamai detected the Fast Flux botnet with 14,000 IP addresses
- Discovering botnets digging huge encrypted money earns $ 8,500 a day for hackers