Cybercrooks behind the resilient Pushdo botnet are bombarding legitimate small websites with bogus traffic in order to camouflage requests to the zombie network's command and control servers. A varying cast of around 300 genuine (mostly smaller) websites is at the receiving end of queries from zombie drones infected with the …
"Let's hit our botnet by using HTTP requests with a constant string to a small group of static addresses."
Well done, botnet writers. That'll help you evade people watching your traffic for sure!
probably not the point
But it does make the C&C takedown take longer because all of the non-C&C sites have to be proved innocent first...
Or did I just miss something?
Ahhhh, so that's what the heck that strange URL was! Hit one of our very obscure and pretty much abandoned web sites a couple of weeks ago and sent bandwidth through the roof. Now going to the bit-bin, but how about sending all the traffic to apple.com - they can afford it.
- Analysis iPhone 6: The final straw for Android makers eaten alive by the data parasite?
- First Crack Man buys iPHONE 6 and DROPS IT to SMASH on PURPOSE
- First Fondle Reg journo battles Sydney iPHONE queue, FONDLES BIG 'UN
- TOR users become FBI's No.1 hacking target after legal power grab
- Vid Reg bloke zips through an iPHONE 6 queue from ZERO to 60 SECONDS