Microsoft seized 22 domain names from dynamic DNS provider No-IP as those domains were being abused in malware-related crimes against Windows users. With a special order from federal court, Microsoft became the domain IP resolver for the No-IP domains. In this process, millions of innocent users got affected due to domain issues that happened due to Microsoft’s actions. No-IP provided the following statement regarding this, We have been in contact with Microsoft today. They claim that their intent is to only filter out the known bad hostnames in each seized domain, while continuing to allow the good hostnames to resolve. However, this is not happening. Apparently, the Microsoft infrastructure is not able to handle the billions of queries from our customers. Millions of innocent users are experiencing outages to their services because of Microsoft’s attempt to remediate hostnames associated with a few bad actors. Had Microsoft contacted us, we could ...

Read More →

A new study released Tuesday shows cybercrime is a booming business for organized crime groups all over the world. The study, conducted by IDC and the National University of Singapore (NUS), reveals that businesses worldwide will spend nearly $500 billion in 2014 to deal with the problems caused by malware on pirated software. Individual consumers, meanwhile, are expected to spend $25 billion and waste 1.2 billion hours this year because of security threats and costly computer fixes. Forensic analysis has uncovered that of 203 computers purchased in 11 countries as “new” (but actually loaded with pirated software), 61 percent were infected with dangerous malware. Most of the infected computers had more than one malware threat on them, and any one threat could infect multiple files. Sixty percent of consumers surveyed say their greatest fear from infected software is the loss of data, files or personal information, followed by unauthorized Internet transactions (51 ...

Read More →

In a coordinated operation, codenamed Operation b54, Microsoft, in cooperation with leaders in the financial services industry – including the Financial Services – Information Sharing and Analysis Center (FS-ISAC), NACHA – The Electronic Payments Association, the American Bankers Association (ABA) – Agari,  and other technology industry partners, as well as the FBI, announced it has successfully disrupted more than a thousand botnets that are responsible for stealing people’s online banking information and personal identities. The FBI took coordinated separate steps related to the operation. This coordinated disruption resulted from an extensive investigation that Microsoft that began in early 2012. After looking into this threat, it was discovered that once a computer was infected with Citadel malware, that malware began monitoring and recording a victim’s keystrokes. This allowed hackers to gain direct access to a victim’s bank account or any other online account in order to withdraw money and/or steal personal identities.  Microsoft also ...

Read More →

The Zues botnet, which controlled around 3.6 million PCs in the US and many more around the world, is taking a bit longer than Microsoft thought to clean up. Microsoft sized control of the botnet in earlier this year by attacking its Command and Control servers in Pennsylvania and Illinois. The botnet was being used primarily to steal banking details of infected users so their accounts could be emptied, and was also sending Facebook spam. Now Microsoft has won a court order on the 28th November to allow the company and its financial-services partners to continue to administer command-and-control servers for two Zeus botnets. "This additional time will allow Microsoft to continue to work with Internet service providers and Computer Emergency Response Teams (CERTs) to clean those computers that are still infected with the malware," Richard Boscovich, senior attorney for Microsoft’s Digital Crimes Unit said. Besides the Zues botnet, over ...

Read More →