Feeds

Tequila botnet auto-destructs

Cover blown, ends it all

Intelligent flash storage arrays

A botnet targeting Mexican surfers has been dismantled just weeks after it first appeared, apparently by the cybercrook who established it rather than by any action by the federales or ISPs.

Trend Micro reckons cybercrooks pressed the auto-destruct on the Tequila botnet, perhaps because an earlier post by the security firm blew its cover and exposed the proxy servers and redirected hosts used by botherders in controlling the network of virus-infected, compromised PCs that made up its ranks. New instructions sent to the bots late last week effectively switched off the flow of phishing attack emails the zombie network was spreading.

The cybercrook behind the Tequila botnet wasted little time in establishing a new network of compromised PCs, dubbed the Mariachi botnet, but this zombie network is not as feature-rich or capable as its defunct sibling. By Monday however both botnets went offline after their respective command-and-control (C&C) servers were taken down. Hosting provider Bluehost pulled the plug on the Mariachi botnet while the more complex control infrastructure of the Tequilla botnet also went down, likely at the hands of its former master.

Trend Micro has a blog post on the rise and fall of the twin Mexican botnets here. ®

Remote control for virtualized desktops

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?