Source: Grappling with the ZeroAccess Botnet
Enjoy! Remember to clean any PC with ZA malware.
In a ZeroAccess botnet, the productive activity (from an attacker’s point of view) is performed by the payloads downloaded to compromised computers, which boil down to two basic types, both aimed at revenue generating activities.
For a more detailed look into ZeroAccess and Symantec's sinkholing of roughly half of the entire botnet, read the Security Response whitepaper:
ZeroAccess InDepth (PDF)
![]()
Enjoy! Remember to clean any PC with ZA malware.