Symantec seizes part of massive peer-to-peer botnet

Symantec takes down 500k bots of botnet used for bitcoin mining

Symantec takes down 500k bots of botnet used for bitcoin mining submitted by leepfrog to Bitcoin [link] [comments]

Symantec takes on one of largest botnets in history "The security firm is confronting the ZeroAccess botnet, which is likely to have more than 1.9 million slave computers at its disposal for click fraud and bitcoin mining."

Symantec takes on one of largest botnets in history submitted by Libertatea to technology [link] [comments]

Symantec takes on one of largest botnets in history "The security firm is confronting the ZeroAccess botnet, which is likely to have more than 1.9 million slave computers at its disposal for click fraud and bitcoin mining."

Symantec takes on one of largest botnets in history submitted by ClownFromMars to realtech [link] [comments]

PSA: AT&T spamming "malware infection advisories" to Bitcoin users

Beginning Friday, it seems AT&T is calling Bitcoin a "malware infection". I have received two emails so far, one each day - so it seems to be a recurring issue, not simply a one time thing. (To those unaware, port 8333 is Bitcoin.)
Furthermore, their RBL (email spam filter) is apparently run by incompetent people, since they have blacklisted my private email server (hosted on a dedicated server, not AT&T, with proper RDNS etc) which is used by nobody outside my immediate family and has never been used to send spam. Thus, I cannot even reply or complain to them about this.
Full message:
Malware infection advisory from AT&T Internet Services Security Center Bellsouth Member ID: *hidden*@att.net Luke Dashjr Primary Member ID: *hidden*@att.net Dear Luke Dashjr, AT&T has received information indicating that one or more devices using your Internet connection may be infected with malicious software. Internet traffic consistent with a malware infection (“unknown”) was observed on Apr 8, 2016 at 9:18 AM EDT from the IP address *hidden*. Our records indicate that this IP address was assigned to you at this time. Infected computers are often used as part of a zombie computer network (“botnet”). Botnets are networks of computers which have been infected with malware and placed under the control of a hacker or group of hackers. They are often used for attacks on websites, spamming, fraud, and distribution of additional malware. Because malware is designed to run in secret, an infected computer may display no obvious symptoms. To address this matter we ask that you take the following actions. If your computer(s) are managed by an Information Technology (IT) group at your place of work, please pass this information on to them. 1. If you use a wireless network, an infected computer may be using your Internet connection without your knowledge. Ensure that your wireless router is password-protected and using WPA or WPA2 encryption (use WEP only if WPA is not available). Check the connections to the router and ensure that you recognize all connected devices. 2. Ensure your firewall settings and anti-virus software are up-to-date, and install any necessary service packs or patches. Scan all systems for viruses and other malware. Additional tools and information: * Tools for removing rootkits, bots, and other crimeware: * Norton Power Eraser: https://security.symantec.com/nbrt/npe.aspx (Windows) * McAfee Rootkit Remover: http://www.mcafee.com/us/downloads/free-tools/rootkitremover.aspx (Windows) * Tools for general virus and malware removal: * Microsoft Safety & Security Center: http://www.microsoft.com/security/ (Windows) * Malwarebytes Anti-Malware: http://malwarebytes.org/ (Windows, Android) * Spybot +AV: http://www.safer-networking.org/ (Windows) * OS X Gatekeeper: http://support.apple.com/kb/HT5290 (OS X) * AT&T Malware and Network Security analysts gather weekly to give you the information that you need to know about the latest security news and trends. Visit AT&T ThreatTraq at http://techchannel.att.com/showpage.cfm?ThreatTraq Regards, AT&T Internet Services Security Center Incident details for *hidden* Type: unknown Source port: 39394 Destination IP: 5.xx.xx.205 Destination port: 8333 For security reasons, the destination IP is partially obscured. DISCLAIMER: The information above contains links to software by third-party vendors (hereafter, “the Software”). AT&T is not responsible for support or assistance for any of the Software. If you need support or assistance with any of the Software, please contact the Software's vendor directly. AT&T is unable to provide a warranty or guarantee, either expressed or implied, for any of the Software. You will be responsible for your own system software and system security and not hold AT&T, its partners, agents or affiliates liable for any costs or damages whatsoever (including, without limitation, damages to access system, hardware and/or software) to your computer as a result of installing or using any of the Software. You also understand that use of all hardware and/or software must comply with the Bellsouth Acceptable Use Policy. Important Note: This email contains links to various websites. You may copy and paste the URL(s) into your browser rather than clicking directly on the link. ©2005 - 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Privacy Policy (Updated July 24, 2015) 
(I consider this PSA to be fair use under the Copyright Act.)
submitted by luke-jr to Bitcoin [link] [comments]

If malicious hackers can pool together tons of phones together to reach considerable hashing power; Can a positive community crowdsource a large batch of cheap USB miners with auto-p2pool configurations? A significant amount of small parts add up to a greater sum!

We now hold the discussion about the danger of GHash's strength, let's use this energy to make a difference.
Let's use frictionless money to make it easy for a bunch of small contributions to make a big difference.
Ghash is popular because it's easy to mine at any amount and get a small payout, even if it doesn't quite break even.
P2Pools offer the same advantage because there is no middleman to collect fees. Yet until P2Pools get larger hashing power, this makes it not advantageous for small miners to individually direct towards P2Pools..
Yet if a bunch of small miners directed towards a single pool, it can make a significant difference
Developers have already created bot-net type applications that use phones to pool together and mine. It has occured on iOS, Android and has been occurring since 2011.
So if developers can do this maliciously, could we use this same mentality in a beneficial way to easily and cheaply secure the network?
Currently you can get small USB miners for a few bucks. And if you want to spend a little bit more, it's easy to get a hub/dock to group more then a few miners together.
Yet even just running one device in the background while online would be useful if many people did this.
So what can we do?
Well the best way to coordinate an effort would be to crowd-fund a kickstarter like campaign to buy a bulk amount of USB miners so that people could spend a few bucks and get a miner or two to give to friends.
It would be great to get a large vendor trying to rid stock could do something like this perhaps?
Ideally I would like to use Lighthouse yet it is not ready. I am unaware of any other decentralized crowd-sourcing applications.
If nothing else arrises then Bitcoin Starter could be a substitute for such a fund.
How many people would be interested in running a small USB miner in the background while your on your computer? If everyone pitched in a buck or two to get a small miner shipped to their house, would you run it?
Please give your thoughts! If you can help please stand up and if your willing to support make that known! If you think this is stupid then say so!
tl;dr: let's see if we can get a community crowdsourced effort to distribute small usb miners to a crowd of people. If they all pointed their dust-amount of hashing power it could add up to a greater sum. If done with a P2Pool it could be a very beneficial action to secure bitcoin's decentralization.
submitted by ForestOfGrins to Bitcoin [link] [comments]

What is a Botnet?  #30SecTech by Norton Symantec Guide to Scary Internet Stuff Botnets North Korea Accused of Stealing Bitcoin! ~ Hacker Daily 9/1/17 Security Now 643: The Story of Bitcoin BOTNET - CHEAP SPOTS

Security firm Symantec says it has taken a chunk out of one of the world's largest known botnets. ZeroAccess, which comprises 1.9 million infected PCs, is used to earn money for its operators by generating false advertising clicks and 'mining' bitcoins, using infected computers to conducted the algorithmic calculations used to generate the digital currency. See also: Suspected botnet master Symantec takes on one of largest botnets in history. The security firm is confronting the ZeroAccess botnet, which is likely to have more than 1.9 million slave computers at its disposal for click It's botnet-takedown time again: Symantec has intercepted and redirected more than a half-million machines infected by the pervasive click-fraud botnet ZeroAccess, one of the world's largest botnets. According to Symantec, the ZeroAccess botnet consists of more than 1.9 million infected computers and is used primarily to perform click fraud and Bitcoin mining in order to generate revenues Information security specialist Symantec has announced on its Security Response blog that it has taken the first steps towards combating the ZeroAccess botnet. The company has

[index] [29128] [28739] [12147] [30920] [19857] [28818] [7543] [3790] [27298] [6438]

What is a Botnet? #30SecTech by Norton

In this special rebroadcast of Security Now from February 9, 2011, Steve Gibson explains, in detail, exactly how Bitcoin works. Download or subscribe to this... The Threat of Bots and Botnets IoT Network Security - Duration: 3:43. Check Point Software Technologies, Ltd. 18,469 views For more information visit https://nr.tn/Botnet Good bots help crawl and index the Web, but bad bots replicate, infect, and form malicious networks or “botnets” that steal passwords, log ... qbot botnet scanner,qbot botnet files,qbot botnet setup,qbot botnet tutorial,qbot botnet download,qbot botnet setup tut,qbot botnet source,qbot botnet github mirai botnet source,mirai botnet spots ... This video is unavailable. Watch Queue Queue. Watch Queue Queue

Flag Counter