<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>botnet &#8211; Martijn Grooten</title>
	<atom:link href="/tag/botnet/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Lapsed Ordinary</description>
	<lastBuildDate>Fri, 06 Jul 2018 12:00:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Necurs update reminds us that the botnet cannot be ignored</title>
		<link>/2018/07/06/necurs-update-reminds-us-that-the-botnet-cannot-be-ignored/</link>
					<comments>/2018/07/06/necurs-update-reminds-us-that-the-botnet-cannot-be-ignored/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Fri, 06 Jul 2018 12:00:47 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[c&c]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[necurs]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[trend micro]]></category>
		<category><![CDATA[virus bulletin]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=479</guid>

					<description><![CDATA[The operators of the Necurs botnet, best known for being one of the most prolific spam botnets of the past few years, have pushed out updates to its client, which provide some important lessons about why malware infections matter. More on Virus Bulletin&#8217;s blog.]]></description>
										<content:encoded><![CDATA[<p>The operators of the Necurs botnet, best known for being one of the most prolific spam botnets of the past few years, have pushed out updates to its client, which provide some important lessons about why malware infections matter.<br />
More on Virus Bulletin&#8217;s <a href="https://virusbulletin.com/blog/2018/07/necurs-update-reminds-us-botnet-cannot-be-ignored/">blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/07/06/necurs-update-reminds-us-that-the-botnet-cannot-be-ignored/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hide&#039;n&#039;Seek IoT botnet adds persistence</title>
		<link>/2018/05/09/hidenseek-iot-botnet-adds-persistence/</link>
					<comments>/2018/05/09/hidenseek-iot-botnet-adds-persistence/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Wed, 09 May 2018 09:28:02 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[bitdefender]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[hide'n'seek]]></category>
		<category><![CDATA[internet of things]]></category>
		<category><![CDATA[iot]]></category>
		<category><![CDATA[virus bulletin]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=432</guid>

					<description><![CDATA[The Hide&#8217;n&#8217;Seek IoT botnet has received an update to make its infection persist on infected devices beyond a restart. Read more on Virus Bulletin&#8217;s blog.]]></description>
										<content:encoded><![CDATA[<p>The Hide&#8217;n&#8217;Seek IoT botnet has received an update to make its infection persist on infected devices beyond a restart.<br />
Read more on <a href="https://www.virusbulletin.com/blog/2018/05/hidenseek-iot-botnet-adds-persistence/">Virus Bulletin&#8217;s blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/05/09/hidenseek-iot-botnet-adds-persistence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Return of Qakbot</title>
		<link>/2014/02/18/the-return-of-qakbot/</link>
					<comments>/2014/02/18/the-return-of-qakbot/#comments</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Tue, 18 Feb 2014 17:03:15 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[anubisnetworks]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[c&c]]></category>
		<category><![CDATA[qakbot]]></category>
		<guid isPermaLink="false">http://www.lapsedordinary.net/?p=121</guid>

					<description><![CDATA[Together with João Gouveia of AnubisNetworks, and using their real-time feeds, I&#8217;ve been looking at Qakbot, a piece of malware that was huge in 2011 and had since disappeared off the radar. We found that Qakbot is still active and there are at least 20,000 infected devices. The command and control protocol has progressed from [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Together with <a href="https://twitter.com/jgouv">João Gouveia</a> of <a href="http://www.anubisnetworks.com/">AnubisNetworks</a>, and using their real-time feeds, I&#8217;ve been looking at Qakbot, a piece of malware that was huge in 2011 and had since disappeared off the radar.<br />
We found that Qakbot is still active and there are at least 20,000 infected devices. The command and control protocol has progressed from version 2 back in 2011 to version 8 today. We cracked the obfuscation used in earlier protocols, but are still struggling with version 8, which appears to use encryption rather than obfuscation.<br />
I tried a large number of obvious and slightly less tricks to crack the protocol (including RC4, which I didn&#8217;t mention in the blog post), but so far to no avail. If anyone has any suggestions on how the encryption might work, we are of course happy to learn of it.<br />
Still, I am quite content with the research we did, which will hopefully contribute to the knowledge of and the fight against Qakbot. The blog post is <a href="http://www.anubisnetworks.com/the-return-of-qakbot/">here</a>. (NB the original blog post is not available any longer; an archived version can be found <a href="https://web.archive.org/web/20140426002642/http://www.anubisnetworks.com:80/the-return-of-qakbot/">here</a>.)</p>
]]></content:encoded>
					
					<wfw:commentRss>/2014/02/18/the-return-of-qakbot/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
