|How do you perform on a test that checks if your device can contact a known Botnet? |
How are we testing?:
This test tries to contact a known Botnet command and control server ('calling home') and download a benign file. The server is selected from Google's Safebrowsing list; real information is not sent out.
Why is this test important?:
Once a device is 'botted,' it's no longer entirely under your control - criminals can now direct it for their own purposes. 'Botted' devices might try to exfiltrate your intellectual property or credentials, infect other machines on your internal network, participate in Distributed Denial of Service attacks, email spam, spread spyware and more.
Botnets affect millions of computers
Tens of millions of computers are taken over by botnets every year. In one example, the notorious Gameover ZeuS botnet, blamed for infecting over one million computers in 12 countries and the theft of more than $100 million worldwide, has already been revived by criminals - just five weeks after its takedown by the FBI. Source
|In the News:|
19 Jun 2017
Providers that don't have intrusion detection software need to seriously consider getting it to detect data going in and out of the network, Kim advises. Without such detection software, a botnet could be delivering an organization's data to an ...
19 Jun 2017
MISSISSAUGA, Ontario – June 15th, 2017 – Conexsys Communications Limited is pleased to introduce its latest Managed Service offering, Encompass® Cloud, which provides cloud-based, managed cybersecurity for large and mid-sized enterprises in ...
14 Jun 2017
... in the Operation Blockbuster report released in February 2016, but the DHS and FBI have compiled a list of IP addresses known to be affiliated or infected by this bot, along with YARA rules that will help companies and professionals add detection ...