Impact of ZeroAccess Botnet

Ink

Administrator
Thread author
Verified
Jan 8, 2011
22,489
Source: Grappling with the ZeroAccess Botnet

In a ZeroAccess botnet, the productive activity (from an attacker’s point of view) is performed by the payloads downloaded to compromised computers, which boil down to two basic types, both aimed at revenue generating activities.

For a more detailed look into ZeroAccess and Symantec's sinkholing of roughly half of the entire botnet, read the Security Response whitepaper:
ZeroAccess InDepth (PDF)

zeroaccess_blog_infographic.png

Enjoy! Remember to clean any PC with ZA malware.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top