Microsoft Recruits Help to Tackle ZeroAccess Botnet

By Rory Lidstone December 06, 2013

Most people only know Microsoft for its software, with Windows and Office being the most well known. But did you know the company is also pretty involved in combating cyber crime? Earlier this year, for example, Microsoft partnered with the FBI to tackle the Citadel botnet after it was used to steal upwards of half a billion dollars over the prior 18 months. Meanwhile, Microsoft’s Malware Protection Center does its part by warning of ways cyber criminals ay attempt to attack businesses and individuals.

Now it seems the company is at it again, this time tackling the botnet behind a recent hacking effort that compromised tow million social network users and cost online advertisers more than $2.7 million per month. By once again partnering with the FBI, as well as A10 Networks and Europol’s Cybercrime Center (EC3), Microsoft managed to stop the botnet, known as ZeroAccess, from doing further damage.

In fact, Microsoft is no working on a preliminary court injunction to direct U.S. ISPs, as well as other groups that control IP addresses, to shut down the botnet’s network. The suit, which was filed in a Texas district court, also acts these groups to preserve any material or content associated with the botnet to help Microsoft’s fight.

Put simply, ZeroAccess affects search engines through the hijacking of a person’s computer. It then redirects that person’s search results, leading them to sites which install malware on the target computer. This allows the cyber criminals behind the botnet to access personal information, while allowing them to commit fraud by charging businesses for advertising clicks.

As of now, ZeroAccess has not been completely disabled, which is why Microsoft has recruited extra help and filed the Texas court injunction. The hope is that the combined technical and legal actions of all involved parties will disable the botnet entirely.




Edited by Stefania Viscusi

TechZone360 Contributing Writer

SHARE THIS ARTICLE
Related Articles

LogJam Computer Bug Creates Another Ruckus

By: Peter Bernstein    5/21/2015

When it comes to malware and other types of computer bugs it seems like we are falling into a problematic pattern: it consists of researchers or "ethi…

Read More

Network Shifts to Support Video Distribution

By: Tara Seals    5/21/2015

Network strategies are underpinned by many aspects. It starts with consumer adoption of online and mobile video in droves. It continues with local cac…

Read More

Fed Cloud Computing Caucus Report Outlines Plan to Increase Cloud Services Adoption

By: Laura Stotler    5/20/2015

The U.S. government has been slowly making a migration to the cloud since the Cloud First policy was instated in 2011, but the going has been tough an…

Read More

Lenovo Could be the New Powerhouse on the Block

By: Rob Enderle    5/19/2015

Next week is the launch of Lenovo Technology World in China and the CEOs of Intel, Microsoft, and Baidu (likely the only company that scares the crap …

Read More

Why Seller Security Risk Assessments Can Make Marketers Mad

By: Peter Bernstein    5/19/2015

We live in a world where e-commerce is increasingly becoming the way transactions take place. It is a world where programmatic advertising is foundati…

Read More