Blog        Forum        Spam        Check & Secure                      
27 May 2015
Monitoring DNS traffic for Security Threats

The goal of fast-flux is for a fully qualified domain name (such as to have multiple (hundreds or even thousands) IP addresses assigned to it. These IP addresses are swapped in and out of flux with extreme frequency, using a combination of

Read more

22 may 2015
Cryptowall 3.0 spread through SPAM campaign

On 11th of June SANS Internet Storm Centre reported that Cryptowall 3.0 infections sources added recently a new catalyst: malicious spam campaigns. This piece of news follows the recent discovery of another spam campaign in April that was pushing CTB Locke

Read more

18 May 2015
Botnet-assisted attacks in Q1 2015

Kaspersky Lab has published a report detailing botnet based distributed denial-of-service (DDoS) attacks launch by malicious actors in the first quarter of 2015.

Read more

15 May 2015
The ZeroAccess Botnet

ZeroAccess, also known as max++ and Sirefef, is Trojan horse computer malware that affects Microsoft Windows operating systems. It is used to download other malware on an infected machine from a botnet mostly involved in Bitcoin mining and click fraud, whi

Read more

15 May 2015
REPORT on Cyber Security Alerts processed by CERT-RO in 2014

The objective of this report is to analyze cyber security alerts collected and processed by CERT-RO in 2014, in order to obtain an overview of the relevant events to risk assessment on cyber security IT infrastructure and electronic communications in Roman

Read more

14 May 2015
The iWorm Botnet

A zombie network that exclusively targets Apple computers running Mac OS X across the globe has compromised over 18,000 machines so far, giving hackers backdoor access to infected computers, researchers at Russian antivirus firm Dr.Web warned.

Read more

10 May 2015
The Grum Botnet

The Grum botnet, also known by its alias Tedroo and Reddyb, was a botnet mostly involved in sending pharmaceutical spam e-mails. Once the world's largest botnet, Grum can be traced back to as early as 2007.

Read more

5 May 2015
The Conficker Botnet

On October 23, 2008, Microsoft published the following critical security bulletin: MS08-067, Vulnerability in Server Service Could Allow Remote Code Execution (958644). Microsoft explained that the vulnerability in the server service could allow remote cod

Read more

28 April 2015
The Beebone Botnet

U.S. and European law enforcement agencies have shut down a highly sophisticated piece of the botnet that had infected more than 12,000 computers worldwide, allowing hackers to steal victims’ banking information and other sensitive data.

Read more

24 April 2015
The Simda Botnet

The Simda botnet – a network of computers infected with self-propagating malware – has compromised more than 770,000 computers worldwide. The United States Department of Homeland Security (DHS), in collaboration with Interpol and the Federal Bureau of

Read more

26 February 2015
Botnet taken down through international law enforcement cooperation

On 24 February, Europol's European Cybercrime Centre (EC3) coordinated a joint international operation from its operational centre in The Hague, which targeted the Ramnit botnet that had infected 3.2 million computers all around the world. The operation

Read more

Regarding the security of your computer please consider the following basic rules:

  1. Check your computer for infection.
  2. Install current Service Packs and Security Updates for your system. Activate automatic updates.
  3. Check your internet browser and the embedded plugins (e.g. Java, Flash, Shockwave, Quicktime) regularly for Actuality.
  4. Install a virus scanner and update it regularly.
  5. Use a Firewall e.g. Windows built-in Firewall or a Router.

Good to know

Find out what botnets are, the damage they cause, and how they threaten the data on your computer.

Here you can find small programs and tutorials which enable you to remove a botnet infection from your computer.

In this section you will find many tips on how to protect your computer from infection.

Copyright © 2014-2015 CERT-RO. All rights reserved.