Cybercrooks behind the resilient Pushdo botnet are bombarding legitimate small websites with bogus traffic in order to camouflage requests to the zombie network's command and control servers. A varying cast of around 300 genuine (mostly smaller) websites is at the receiving end of queries from zombie drones infected with the …
"Let's hit our botnet by using HTTP requests with a constant string to a small group of static addresses."
Well done, botnet writers. That'll help you evade people watching your traffic for sure!
probably not the point
But it does make the C&C takedown take longer because all of the non-C&C sites have to be proved innocent first...
Or did I just miss something?
Ahhhh, so that's what the heck that strange URL was! Hit one of our very obscure and pretty much abandoned web sites a couple of weeks ago and sent bandwidth through the roof. Now going to the bit-bin, but how about sending all the traffic to apple.com - they can afford it.
- Put down that Oracle database patch: It could cost $23,000 per CPU
- The END of the FONDLESLAB KINGS? Apple and Samsung have reason to FEAR
- Pics It's Google HQ - the British one: Reg man snaps covert shots INSIDE London offices
- Bose decides today IS F*** With Dre Day: Beats sued in patent spat
- DAYS from end of life as we know it: Boffins tell of solar storm near-miss