Waledac: March, 2010

Though not nearly as large or important a botnet, Waledac – which counted fewer than 100,000 infected hosts at its height – was notable for the tactics that researchers used to dismantle the botnet. Microsoft worked with a group of researchers at the University of Mannheim, the University of Vienna and elsewhere to identify the key command and control servers, analyze the botnets peer-to-peer communication protocol and work out a plan for putting Waledac down in one fell swoop.

Though not nearly as large or important a botnet, Waledac – which counted fewer than 100,000 infected hosts at its height – was notable for the tactics that researchers used to dismantle the botnet. Microsoft worked with a group of researchers at the University of Mannheim, the University of Vienna and elsewhere to identify the key command and control servers, analyze the botnets peer-to-peer communication protocol and work out a plan for putting Waledac down in one fell swoop. The plan required working with law enforcement and ISPs to take down nearly 300 .com domains – an approach that was repeated with the Rustock botnet a year later.

SEE ALSO Waledac Botnet Now Completely Crippled, Experts Say

T.J. Campana on the Waledac Botnet Takedown

Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.