Mega-D: March, 2010

The takedown of Mega-D, also known as Ozdok, was spearheaded by researchers at anti-botnet firm FireEye. The botnet, a byproduct of PC infections linked to the Mega-D Trojan, comprised tens of thousands of machines and was responsible for sending out a large portion of the spam on the Internet–at some points north of 30 percent. By March, 2010, researchers had identified the botnet and had a good handle on its command-and-control structure. Researchers at FireEye then worked with Internet Service Providers (ISPs) to take the servers offline.

The takedown of Mega-D, also known as Ozdok, was spearheaded by researchers at anti-botnet firm FireEye. The botnet, a byproduct of PC infections linked to the Mega-D Trojan, comprised tens of thousands of machines and was responsible for sending out a large portion of the spam on the Internet–at some points north of 30 percent. By March, 2010, researchers had identified the botnet and had a good handle on its command-and-control structure. Researchers at FireEye then worked with Internet Service Providers (ISPs) to take the servers offline. The company was able to get all but four of the C&C servers offline, and also took six of the C&C domains offline by working with the registrars involved.

SEE ALSO FBI Arrests Alleged Head of Mega-D Botnet Operation

How to Take Down a Botnet

Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.