Microsoft outlined its investigation into the hard drives belonging to the botnet’s command and control servers in a status report to the United States District Court for the Western District of Washington on May 23. Microsoft researchers had been analyzing and studying the hardware seized by the U.S. Marshalls Service and other law enforcement agencies during the March 17 raid, Network World reported May 24.
The investigators uncovered “additional evidence” that the seized servers had been part of the botnet’s “spam-dissemination,” Microsoft told U.S. District Court Judge James Robart in the filing. The hard drives contained custom software that assembled spam messages and text files containing thousands of email addresses and username/password combinations. Microsoft also found evidence that criminals had used stolen credit card numbers to purchase hosting and e-mail services.
nod32 serial nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri
Hiç yorum yok:
Yorum Gönder