Cybercrooks behind the resilient Pushdo botnet are bombarding legitimate small websites with bogus traffic in order to camouflage requests to the zombie network's command and control servers. A varying cast of around 300 genuine (mostly smaller) websites is at the receiving end of queries from zombie drones infected with the …
"Let's hit our botnet by using HTTP requests with a constant string to a small group of static addresses."
Well done, botnet writers. That'll help you evade people watching your traffic for sure!
probably not the point
But it does make the C&C takedown take longer because all of the non-C&C sites have to be proved innocent first...
Or did I just miss something?
Ahhhh, so that's what the heck that strange URL was! Hit one of our very obscure and pretty much abandoned web sites a couple of weeks ago and sent bandwidth through the roof. Now going to the bit-bin, but how about sending all the traffic to apple.com - they can afford it.
- Vid Antarctic ice THICKER than first feared – penguin-bot boffins
- Antique Code Show World of Warcraft then and now: From Orcs and Humans to Warlords of Draenor
- Hi-torque tank engines: EXTREME car hacking with The Register
- Review What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
- Regin: The super-spyware the security industry has been silent about