'Iranian Cyber Army' building botnet with exploit kit

Summary:The self-styled "Iranian Cyber Army" has moved beyond website defacements and are now using an exploit kit to build a massive botnet.

The self-styled "Iranian Cyber Army," the group responsible for hacking attacks against TechCrunch, Twitter and Baidu, has moved beyond website defacements and is now using an exploit kit to build a massive botnet.

According to research outfit Seculert, the group's fingerprints were found on a crime server hosting exploits against Oracle Sun's Java, Adobe PDF and various Microsoft software products.

Seculert chief technology officer Aviv Raff said the crime server is hosting a botnet of Windows machines:

...There are currently over 400,000 “confirmed loads,” i.e., machines that were successfully exploited and infected with the malware.  However, while tracking these numbers our research team noticed that once in a while the counter got reset, which means that the actual number of infected machines should be much larger. We also noticed that the number of loads per hour is kept steady at around 14,000. As we were able to track the use of this exploit kit back to August 2010, we can now extrapolate the number of machines that potentially got infected by this group of cyber criminals: 14,000 x 24hrs x 60days ~= 20 million infected machines!


Topics: Security


Ryan Naraine is a journalist and social media enthusiast specializing in Internet and computer security issues. He is currently security evangelist at Kaspersky Lab, an anti-malware company with operations around the globe. He is taking a leadership role in developing the company's online community initiative around secure content managem... Full Bio

zdnet_core.socialButton.googleLabel Contact Disclosure

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.