Mapping the Criminal-ISP Infrastructure

According to a report issued today, eight networks connect
directly to the botnet-hosting ISP Troyak and four other upstream providers that “surround the
malicious core,” and help to “mask the true malware-hosting armada and
provide solid uptime to the malware servers” for ZeuS botnets, Gozi, and RockPhish among others. Read the full article. [KrebsonSecurity]

According to a report issued today, eight networks connect
directly to the botnet-hosting ISP Troyak and four other upstream providers that “surround the
malicious core,” and help to “mask the true malware-hosting armada and
provide solid uptime to the malware servers” for ZeuS botnets, Gozi, and RockPhish among others. Read the full article. [KrebsonSecurity]

Suggested articles