{"id":1037,"date":"2020-10-17T20:40:10","date_gmt":"2020-10-18T01:40:10","guid":{"rendered":"https:\/\/truxgoservers.com\/blog\/?p=1037"},"modified":"2020-10-17T20:40:12","modified_gmt":"2020-10-18T01:40:12","slug":"botnets-that-were-exploited-by-cybercriminals","status":"publish","type":"post","link":"https:\/\/truxgoservers.com\/blog\/botnets-that-were-exploited-by-cybercriminals\/","title":{"rendered":"Botnets that were exploited by Cybercriminals"},"content":{"rendered":"\n<p>Although there have been countless botnets that have circulated through the Cloud, the vast majority have only been variations of a few that have created a school among the community of evil programmers. Of these botnet models, some have stood out both for the damage they could cause and for the number of compromised systems.<\/p>\n\n\n\n<p>Although some of these malware are currently dismantled, since patches have been released and are well known to antivirus and thus easily blocked, they can become a threat again if modifications were made to their original code. But others are still active and could do a lot of damage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Botnets<\/h2>\n\n\n\n<p><strong><em>\u25b8STORM<\/em><\/strong><\/p>\n\n\n\n<p>Storm was the largest and most widely spread botnet to date. It had the added value of being available for sale or rental from others, particularly because of its DDoS capabilities. Social engineering and spam helped its spread, but its attackers also launched it through downloads on popular websites that were compromised, making downloads a major factor in infection with around 1,000,000 to 50,000,000 of them. infected computers.<\/p>\n\n\n\n<p><strong><em>\u25b8COFICKER<\/em><\/strong><\/p>\n\n\n\n<p>Conficker is the only one that downloads updates on its own, using signed and encrypted binaries to help avoid any cleaning action. Once version E is active, Waledac is downloaded and installed to send spam which is estimated to have infected between 9,000,000 and 15,000,000 computers. SpyProtect 2009 is a variation with which to try to convince potential victims to buy a fake antivirus program when in reality what it does is initiate a series of DoS attacks.<\/p>\n\n\n\n<p><strong><em>\u25b8BUTTERFLY<\/em><\/strong><\/p>\n\n\n\n<p>Butterfly infected an approximate number of 1,000,000 to 12,000,000 computers, being a keylogger, software that monitors and records in a registry the user&#8217;s keyboard activity to capture credentials in banking sites, credentials with which to send massive spam messages and take the computer control for use in DDoS attacks. The Mariposa network was available to rent.<\/p>\n\n\n\n<p><strong><em>\u25b8ZEROACCESS<\/em><\/strong><\/p>\n\n\n\n<p>ZeroAccess can compromise a system by infecting both the hard disk MBR and critical drivers and is capable of disabling both Windows firewall and antivirus software. Microsoft and the North American authorities tried to kill ZeroAccess by taking over command and control consoles, but part of it was lost and these peer-to-peer elements could launch new attacks in the future.<\/p>\n\n\n\n<p><strong><em>\u25b8METULJI<\/em><\/strong><\/p>\n\n\n\n<p>Metulji was influenced by those of other botnets, offered itself as a kit to other criminals, and actually incorporated licensing into its resale options. In addition to participating in DDoS attacks, it logged credentials to banking sites, following keyboard entries from victims with a total of 12,000,000. of computers that became infected with Metulji.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Although there have been countless botnets that have circulated through the Cloud, the vast majority have only been variations of a few that have created a school among the community of evil programmers. Of these botnet models, some have stood out both for the damage they could cause and for the number of compromised systems. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1038,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[186],"class_list":["post-1037","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-botnets","tag-botnets"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Botnets that were exploited by Cybercriminals - Truxgo Server Blog<\/title>\n<meta name=\"description\" content=\"There are many Botnets being malicious programs that can harm us and we will see some of these that were exploited by criminals...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/truxgoservers.com\/blog\/botnets-that-were-exploited-by-cybercriminals\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Botnets that were exploited by Cybercriminals - Truxgo Server Blog\" \/>\n<meta property=\"og:description\" content=\"There are many Botnets being malicious programs that can harm us and we will see some of these that were exploited by criminals...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/truxgoservers.com\/blog\/botnets-that-were-exploited-by-cybercriminals\/\" \/>\n<meta property=\"og:site_name\" content=\"Truxgo Server Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-18T01:40:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-18T01:40:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/10\/Botnets.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Truxgo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Truxgo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-that-were-exploited-by-cybercriminals\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-that-were-exploited-by-cybercriminals\\\/\"},\"author\":{\"name\":\"Truxgo\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\"},\"headline\":\"Botnets that were exploited by Cybercriminals\",\"datePublished\":\"2020-10-18T01:40:10+00:00\",\"dateModified\":\"2020-10-18T01:40:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-that-were-exploited-by-cybercriminals\\\/\"},\"wordCount\":425,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-that-were-exploited-by-cybercriminals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Botnets.png\",\"keywords\":[\"Botnets\"],\"articleSection\":[\"Botnets\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-that-were-exploited-by-cybercriminals\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-that-were-exploited-by-cybercriminals\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-that-were-exploited-by-cybercriminals\\\/\",\"name\":\"Botnets that were exploited by Cybercriminals - Truxgo Server Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-that-were-exploited-by-cybercriminals\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-that-were-exploited-by-cybercriminals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Botnets.png\",\"datePublished\":\"2020-10-18T01:40:10+00:00\",\"dateModified\":\"2020-10-18T01:40:12+00:00\",\"description\":\"There are many Botnets being malicious programs that can harm us and we will see some of these that were exploited by criminals...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-that-were-exploited-by-cybercriminals\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-that-were-exploited-by-cybercriminals\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-that-were-exploited-by-cybercriminals\\\/#primaryimage\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Botnets.png\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Botnets.png\",\"width\":640,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/botnets-that-were-exploited-by-cybercriminals\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Botnets that were exploited by Cybercriminals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"name\":\"Truxgo Server Blog\",\"description\":\"Cloud Server and Hosting Tutorials.\",\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\",\"name\":\"Truxgo Server Blog\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"width\":1250,\"height\":278,\"caption\":\"Truxgo Server Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\",\"name\":\"Truxgo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"caption\":\"Truxgo\"},\"sameAs\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\"],\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/author\\\/truxgo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Botnets that were exploited by Cybercriminals - Truxgo Server Blog","description":"There are many Botnets being malicious programs that can harm us and we will see some of these that were exploited by criminals...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/truxgoservers.com\/blog\/botnets-that-were-exploited-by-cybercriminals\/","og_locale":"es_MX","og_type":"article","og_title":"Botnets that were exploited by Cybercriminals - Truxgo Server Blog","og_description":"There are many Botnets being malicious programs that can harm us and we will see some of these that were exploited by criminals...","og_url":"https:\/\/truxgoservers.com\/blog\/botnets-that-were-exploited-by-cybercriminals\/","og_site_name":"Truxgo Server Blog","article_published_time":"2020-10-18T01:40:10+00:00","article_modified_time":"2020-10-18T01:40:12+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/10\/Botnets.png","type":"image\/png"}],"author":"Truxgo","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Truxgo","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/truxgoservers.com\/blog\/botnets-that-were-exploited-by-cybercriminals\/#article","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/botnets-that-were-exploited-by-cybercriminals\/"},"author":{"name":"Truxgo","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e"},"headline":"Botnets that were exploited by Cybercriminals","datePublished":"2020-10-18T01:40:10+00:00","dateModified":"2020-10-18T01:40:12+00:00","mainEntityOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/botnets-that-were-exploited-by-cybercriminals\/"},"wordCount":425,"commentCount":0,"publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/botnets-that-were-exploited-by-cybercriminals\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/10\/Botnets.png","keywords":["Botnets"],"articleSection":["Botnets"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/truxgoservers.com\/blog\/botnets-that-were-exploited-by-cybercriminals\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/truxgoservers.com\/blog\/botnets-that-were-exploited-by-cybercriminals\/","url":"https:\/\/truxgoservers.com\/blog\/botnets-that-were-exploited-by-cybercriminals\/","name":"Botnets that were exploited by Cybercriminals - Truxgo Server Blog","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/botnets-that-were-exploited-by-cybercriminals\/#primaryimage"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/botnets-that-were-exploited-by-cybercriminals\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/10\/Botnets.png","datePublished":"2020-10-18T01:40:10+00:00","dateModified":"2020-10-18T01:40:12+00:00","description":"There are many Botnets being malicious programs that can harm us and we will see some of these that were exploited by criminals...","breadcrumb":{"@id":"https:\/\/truxgoservers.com\/blog\/botnets-that-were-exploited-by-cybercriminals\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/truxgoservers.com\/blog\/botnets-that-were-exploited-by-cybercriminals\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/botnets-that-were-exploited-by-cybercriminals\/#primaryimage","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/10\/Botnets.png","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/10\/Botnets.png","width":640,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/truxgoservers.com\/blog\/botnets-that-were-exploited-by-cybercriminals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/truxgoservers.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Botnets that were exploited by Cybercriminals"}]},{"@type":"WebSite","@id":"https:\/\/truxgoservers.com\/blog\/#website","url":"https:\/\/truxgoservers.com\/blog\/","name":"Truxgo Server Blog","description":"Cloud Server and Hosting Tutorials.","publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/truxgoservers.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/truxgoservers.com\/blog\/#organization","name":"Truxgo Server Blog","url":"https:\/\/truxgoservers.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","width":1250,"height":278,"caption":"Truxgo Server Blog"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e","name":"Truxgo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","caption":"Truxgo"},"sameAs":["https:\/\/truxgoservers.com\/blog"],"url":"https:\/\/truxgoservers.com\/blog\/author\/truxgo\/"}]}},"_links":{"self":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/1037","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/comments?post=1037"}],"version-history":[{"count":1,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/1037\/revisions"}],"predecessor-version":[{"id":1039,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/1037\/revisions\/1039"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media\/1038"}],"wp:attachment":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media?parent=1037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/categories?post=1037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/tags?post=1037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}