According to a report issued today, eight networks connect
directly to the botnet-hosting ISP Troyak and four other upstream providers that “surround the
malicious core,” and help to “mask the true malware-hosting armada and
provide solid uptime to the malware servers” for ZeuS botnets, Gozi, and RockPhish among others. Read the full article. [KrebsonSecurity]
Mapping the Criminal-ISP Infrastructure
Author:
Donald Sears
minute read
Share this article:
According to a report issued today, eight networks connect
directly to the botnet-hosting ISP Troyak and four other upstream providers that “surround the
malicious core,” and help to “mask the true malware-hosting armada and
provide solid uptime to the malware servers” for ZeuS botnets, Gozi, and RockPhish among others. Read the full article. [KrebsonSecurity]