{"id":371,"date":"2017-02-12T20:03:46","date_gmt":"2017-02-12T20:03:46","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/dorkbot-life-after-disruption\/"},"modified":"2019-05-29T12:22:16","modified_gmt":"2019-05-29T12:22:16","slug":"dorkbot-life-after-disruption","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/12\/dorkbot-life-after-disruption\/","title":{"rendered":"Dorkbot: Life after disruption"},"content":{"rendered":"<p>A year ago on 2nd December 2015, a collaboration between major cybersecurity firms, law enforcement and software providers \u2013 including ESET and Microsoft \u2013 successfully managed to disrupt Dorkbot, a malware family that had been infiltrating systems worldwide for over four years.<br \/>\nSince its detection in April 2011, Dorkbot had caused numerous problems for businesses and individuals alike, and was described by ESET as \u201cthe most used malware variant\u201d in its 2012 paper Dorkbot: Hunting Zombies in Latin America.<br \/>\nWorming its way into computers in over 190 different countries \u2013 and proving particularly prevalent in Latin America, where 54% of infections were identified \u2013 Dorkbot has been used both to obtain financial and sensitive information, and take down company servers.<br \/>\nSurreptitious infiltration<\/p>\n<p>The spread of this, and other similar malware, was often achieved by cybercriminals who \u2013 having purchased a so-called \u201ccrime kit\u201d \u2013 targeted users by sending genuine-looking emails, infiltrating social networks and instant messaging services and by using removable USB drives.<br \/>\n\u201cYou might click on a link and think no more about it,\u201d explains Zia Rehman, a cybersecurity expert from Perspective Risk. \u201cBut it would install itself on your computer, often masquerading as other programs your computer needs, and then monitor your traffic in the background.\u201d<br \/>\n\u201cIt could also include your system in a [worldwide botnet],\u201d he goes on to explain. \u201cA malicious [attacker] might then use all the connections simultaneously to connect to Facebook or Ebay, for example, and your system is actively part of these attacks.\u201d<br \/>\nSkilled in subterfuge<\/p>\n<p>Lurking in the background of many computers \u2013 and often undetected \u2013 Dorkbot was able to install code on infected computers, steal passwords and connect to an IRC (Internet Relay Chat) server, which would then receive commands to download additional malware.<br \/>\nWorryingly, Dorkbot was also able to disconnect users from virus module updates, meaning that, despite providers identifying the threat and acting accordingly, users remained unaware that their system was infected.<br \/>\nReadily available to criminals, the malware was used to target sites including AOL, eBay, Facebook, Netflix and PayPal, amongst others.<br \/>\nDisrupting Dorkbot<\/p>\n<p>This is why its disruption, \u2018an early Christmas present\u2019, was welcome. Information sharing between organizations about Dorkbot\u2019s behavior meant that expertise from around the globe could be pulled together in order to disrupt what was becoming an enormous threat.<br \/>\nAnd it was tremendously successful \u2013 Dorkbot\u2019s grip on worldwide systems has been loosened. However, other, similar forms of constantly evolving malware still pose an enormous threat to worldwide cybersecurity.<br \/>\nEvolution of threats<\/p>\n<p>\u201cThis year, for example, the Mirai botnet, based on thousands of compromised \u2018Internet of Things\u2019 devices from televisions to security cameras, was used to knock crucial internet services offline,\u201d explained Joe Hancock, cybersecurity lead at Mishcon de Reya LLP.<br \/>\n\u201cThis shows that whilst the specific attacks from Dorkbot were eventually prevented by law enforcement, the overall approach of botnets and those behind them will innovate and change tactics. Law enforcement and the cybersecurity community needs to increase its own innovation to deal with these changes.\u201d<br \/>\nImportance of education<\/p>\n<p>As Rehman noted, the key to minimizing risk lies in educating individuals and organizations \u2013 particularly that of clicking on an attachment or link from an unknown source.<br \/>\nThe more people know, the better equipped they are at spotting threats, and ensuring that they remain better protected. This responsibility also falls on security providers, as ESET noted in 2012:<br \/>\n\u201cWe need to teach users what we do and why, and how we are protecting them against this kind of threat. In the industry we understand the importance of updates and concern about the content we see from our daily activities, but we need to talk to end-users in their own language.\u201d<br \/>\nSafeguarding the world<\/p>\n<p>Despite the success of the move to disrupt Dorkbot, malware remains an ever-evolving threat, both to business and to worldwide security. Dorkbot is indicative of this \u2013 it\u2019s an \u2018old\u2019 type of malware, but one that is still active and capable of reinventing itself.<br \/>\nIt seems therefore that the need for effective cybersecurity to guard against ever-emerging threats, as well as those active in the digital space, is more important than ever.<\/p>\n<p>Source: <a href=\"http:\/\/www.welivesecurity.com\">WeLiveSecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A year ago on 2nd December 2015, a collaboration between major cybersecurity firms, law enforcement and software providers \u2013 including ESET and Microsoft \u2013 successfully managed to disrupt Dorkbot, a malware family that had been infiltrating systems worldwide for over four years. Since its detection in April 2011, Dorkbot had caused numerous problems for businesses<\/p>\n","protected":false},"author":5,"featured_media":1718,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[160],"tags":[],"class_list":["post-371","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Dorkbot: Life after disruption - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/12\/dorkbot-life-after-disruption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dorkbot: Life after disruption\" \/>\n<meta property=\"og:description\" content=\"A year ago on 2nd December 2015, a collaboration between major cybersecurity firms, law enforcement and software providers \u2013 including ESET and Microsoft \u2013 successfully managed to disrupt Dorkbot, a malware family that had been infiltrating systems worldwide for over four years. Since its detection in April 2011, Dorkbot had caused numerous problems for businesses\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/12\/dorkbot-life-after-disruption\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-12T20:03:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:22:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_522985417-623x410.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/12\\\/dorkbot-life-after-disruption\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/12\\\/dorkbot-life-after-disruption\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Dorkbot: Life after disruption\",\"datePublished\":\"2017-02-12T20:03:46+00:00\",\"dateModified\":\"2019-05-29T12:22:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/12\\\/dorkbot-life-after-disruption\\\/\"},\"wordCount\":684,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/12\\\/dorkbot-life-after-disruption\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_522985417-623x410.jpg\",\"articleSection\":[\"malware\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/12\\\/dorkbot-life-after-disruption\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/12\\\/dorkbot-life-after-disruption\\\/\",\"name\":\"Dorkbot: Life after disruption - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/12\\\/dorkbot-life-after-disruption\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/12\\\/dorkbot-life-after-disruption\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_522985417-623x410.jpg\",\"datePublished\":\"2017-02-12T20:03:46+00:00\",\"dateModified\":\"2019-05-29T12:22:16+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/12\\\/dorkbot-life-after-disruption\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/12\\\/dorkbot-life-after-disruption\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/12\\\/dorkbot-life-after-disruption\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_522985417-623x410.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_522985417-623x410.jpg\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/12\\\/dorkbot-life-after-disruption\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dorkbot: Life after disruption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/12\\\/dorkbot-life-after-disruption\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Dorkbot: Life after disruption - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/12\/dorkbot-life-after-disruption\/","og_locale":"en_US","og_type":"article","og_title":"Dorkbot: Life after disruption","og_description":"A year ago on 2nd December 2015, a collaboration between major cybersecurity firms, law enforcement and software providers \u2013 including ESET and Microsoft \u2013 successfully managed to disrupt Dorkbot, a malware family that had been infiltrating systems worldwide for over four years. Since its detection in April 2011, Dorkbot had caused numerous problems for businesses","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/12\/dorkbot-life-after-disruption\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-02-12T20:03:46+00:00","article_modified_time":"2019-05-29T12:22:16+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_522985417-623x410.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/12\/dorkbot-life-after-disruption\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/12\/dorkbot-life-after-disruption\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Dorkbot: Life after disruption","datePublished":"2017-02-12T20:03:46+00:00","dateModified":"2019-05-29T12:22:16+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/12\/dorkbot-life-after-disruption\/"},"wordCount":684,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/12\/dorkbot-life-after-disruption\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_522985417-623x410.jpg","articleSection":["malware"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/12\/dorkbot-life-after-disruption\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/12\/dorkbot-life-after-disruption\/","name":"Dorkbot: Life after disruption - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/12\/dorkbot-life-after-disruption\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/12\/dorkbot-life-after-disruption\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_522985417-623x410.jpg","datePublished":"2017-02-12T20:03:46+00:00","dateModified":"2019-05-29T12:22:16+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/12\/dorkbot-life-after-disruption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/02\/12\/dorkbot-life-after-disruption\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/12\/dorkbot-life-after-disruption\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_522985417-623x410.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_522985417-623x410.jpg","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/12\/dorkbot-life-after-disruption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Dorkbot: Life after disruption"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/12\/dorkbot-life-after-disruption\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=371"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/371\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1718"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}