Impact of ZeroAccess Botnet

Ink

Administrator
Thread author
Verified
Jan 8, 2011
22,318
2
55,055
8,379
Source: Grappling with the ZeroAccess Botnet

In a ZeroAccess botnet, the productive activity (from an attacker’s point of view) is performed by the payloads downloaded to compromised computers, which boil down to two basic types, both aimed at revenue generating activities.

For a more detailed look into ZeroAccess and Symantec's sinkholing of roughly half of the entire botnet, read the Security Response whitepaper:
ZeroAccess InDepth (PDF)

zeroaccess_blog_infographic.png

Enjoy! Remember to clean any PC with ZA malware.