Cybercrooks behind the resilient Pushdo botnet are bombarding legitimate small websites with bogus traffic in order to camouflage requests to the zombie network's command and control servers. A varying cast of around 300 genuine (mostly smaller) websites is at the receiving end of queries from zombie drones infected with the …
"Let's hit our botnet by using HTTP requests with a constant string to a small group of static addresses."
Well done, botnet writers. That'll help you evade people watching your traffic for sure!
probably not the point
But it does make the C&C takedown take longer because all of the non-C&C sites have to be proved innocent first...
Or did I just miss something?
Ahhhh, so that's what the heck that strange URL was! Hit one of our very obscure and pretty much abandoned web sites a couple of weeks ago and sent bandwidth through the roof. Now going to the bit-bin, but how about sending all the traffic to apple.com - they can afford it.
- Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
- Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
- FOUR DAYS: That's how long it took to crack Galaxy S5 fingerscanner
- Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
- Did a date calculation bug just cost hard-up Co-op Bank £110m?