facebook linkedin twitter

Computerware Blog

Microsoft Thwarts Major Hacking Attempt

Microsoft Thwarts Major Hacking Attempt

With the 2020 U.S. Election under a month away, there has been a lot of concern that outside interests would try to influence the results. Microsoft has recently disrupted a huge coordinated hacking effort that had designs of altering the election infrastructure needed for a fair and secure election. Let’s take a look at the effort and Microsoft’s response in today’s blog.

The Skinny

Microsoft and The United States Cyber Command (USCYBERCOM) announced early on October 12, 2020 that they took down the servers that fueled an enormous botnet called TrickBot, but walked it back when it was evident that the botnet was resilient enough to stay up even as their central servers were taken down. Industry professionals described the action as “kneecapping” the botnet rather than “cutting off its head”. Most predict TrickBot to make a comeback. 

TrickBot has an estimated one million devices that have been hijacked and infected with the botnet’s malicious code. Based out of Russia, it is believed that the TrickBot botnet was intent on deploying strategic ransomware attacks to disrupt the 2020 U.S. Presidential election.

Taking Down TrickBot

After the events of the 2016 U.S. Presidential election, most cybersecurity professionals were on the lookout for cybercriminal organizations looking to influence or interrupt the legitimacy of the election. For their part, Microsoft had already warned election officials that several Russian, Iranian, and Chinese hacking collectives are targeting not only the candidates, but also the election infrastructure itself. 

To disrupt the TrickBot’s operational command, Microsoft, USCYBERCOM, and National Security Agency operators were able to send a command to all zombies in the botnet to disconnect themselves after which they were able to flood the TrickBot’s database with millions of false records. 

While it is reported that the TrickBot remains active, the unprecedented effort actually set a legal precedent. Microsoft’s legal team successfully argued that TrickBot abused Windows code for malicious purposes, which stands in breach of the Windows software development kit’s terms of service. By successfully arguing that TrickBot was infringing on their copyright, Microsoft got legal clearance to take down the Malware as a Service.

With a legal precedent, now Microsoft, or any other software company can work to mitigate more malware attacks using their software. 

Do you think that the election is in danger because of foreign hackers? What should be done about it? Leave your thoughts in the comment section below.

Keep Your Business Safe with These Best Practices
Data Loss Is a Potentially Devastating Scenario


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, December 03, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Hardware Workplace Tips Network Security Microsoft Productivity Backup Business Hosted Solutions Email Managed Service Provider Productivity Malware Saving Money IT Services Google Efficiency Innovation Small Business Computer Collaboration User Tips IT Support VoIP Quick Tips Smartphones Data Backup Network IT Support Mobile Devices communications Business Continuity Data Recovery Microsoft Office Gadgets Disaster Recovery Android Cybersecurity Social Media Smartphone Upgrade Phishing Communication Mobile Office Server Virtualization Miscellaneous Mobile Device Management Windows Mobile Device Ransomware Passwords Users Vendor Management Holiday Managed IT Services Operating System Tech Term Apps Windows 10 BDR Outsourced IT Internet of Things Unified Threat Management Remote Monitoring Facebook Automation BYOD Remote Computing WiFi Apple Managed IT services Mobile Computing Analytics Data Management Windows 10 Training Managed Service Artificial Intelligence Browser Save Money Marketing Cloud Computing Help Desk The Internet of Things History Firewall Covid-19 Business Technology Health App Alert Encryption Big data Spam Two-factor Authentication Bandwidth IT Consultant Office Information Technology Office 365 Budget VPN Gmail Managed IT Government Content Filtering Cybercrime Going Green Access Control Bring Your Own Device Information Windows 7 Maintenance Printer Antivirus Blockchain Hard Drives Saving Time Computers Best Practice Lithium-ion Battery Recovery Employer-Employee Relationship Remote Work Retail Windows 8 Outlook Networking Cost Management Wireless Technology Document Management Hiring/Firing Wi-Fi Search Healthcare Tech Support Virus Customer Service iPhone Travel Phone System Storage Education Project Management Conferencing Update IBM Augmented Reality Hacking It Management Data Security Money Humor Computing Data Loss Avoiding Downtime Law Enforcement Wireless Applications Data Breach Intranet Solid State Drive Twitter Voice over Internet Protocol Compliance Website File Sharing Current Events Data storage Flexibility Hard Drive Mobility Risk Management Laptop Customer Relationship Management Password Legal Value Save Time PowerPoint Regulations Vendor Hacker Downtime Administration SaaS Patch Management End of Support Proactive IT Computer Repair Running Cable Social Securty DDoS Digital Websites Black Market Excel Cryptocurrency Google Maps Word Social Engineering Monitoring Software as a Service Net Neutrality Business Growth Employee/Employer Relationship Chrome Cortana Business Intelligence Fax Server Digital Payment Cooperation Management Meetings Router Remote Private Cloud Paperless Office Vulnerabilities Comparison Tablet Sports Telephony Disaster Company Culture Hosted Solution Machine Learning User Scam Social Networking Virtual Desktop Telephone Systems Robot Programming Inbound Marketing IT service Redundancy Statistics Documents Public Cloud Licensing Network Congestion Integration Distribution Evernote Entertainment Teamwork Heating/Cooling Bluetooth Virtual Assistant Pain Points Identity Theft Notifications Managed Services Provider Co-managed IT Streaming Media User Error Cost Display Start Menu Tech Terms Mobile Technology Politics Memory How To Virtual Reality Google Docs Emails eWaste Managed Services Experience Automobile Chromebook Monitors Managed IT Service Cleaning Uninterrupted Power Supply Lifestyle Vulnerability Gaming Console Computing Infrastructure Office Tips Hack Bitcoin Multi-factor Authentication How To YouTube Download Telephone Computer Accessories Processor Processors Webcam Data Protection Text Messaging Unified Communications Settings USB Smart Devices Trending Downloads Presentation Microchip Taxes Mouse Solutions Specifications Safety Employees Video Conferencing Professional Services Distributed Denial of Service SQL Server Trojan Communitications Unified Threat Management Backup and Disaster Recovery Employer Employee Relationship Tip of the week GDPR Managing Risk PCI DSS G Suite Username Google Calendar Printers Pirating Information switches Hacks Writing Screen Reader Physical Security Customer Resource management Touchscreen News Tech Hypervisor Organize Leadership Supply Chain Management Music Gamification VoIP Digital Signature Point of Contact Adminstration Consultation Fileless Malware Hybrid Cloud Internet Service Provider Piracy Relocation Upload Tablets Knowledge Holidays AI Banking Upgrades Smart Tech Botnet Proxy Server Azure IT Assessment LiFi Fiber-Optic Database Modem Strategy Regulations Compliance HTML Sync Technology Tips CCTV Telephone System Fake News Recycling PDF Term Remote Working Mobile Security Audit Electronic Medical Records Analytic Transportation Business Metrics Deep Learning Multi-Factor Security Computer Malfunction Data Warehousing Directions Webinar Software License Reliable Computing Work/Life Balance Trends Best Available Keyboard Product Reviews Recording Optimization Supply Chains Dark Web Domains Read Free Resource Electronic Health Records Visible Light Communication Fraud Tactics Emergency Hard Drive Disposal SSID Upselling Financial Data Devices In Internet of Things Access Video Surveillance Memes IT consulting Microsoft Excel Processing UTM Content Computer Care Health IT Public Speaking 2FA Legislation Motion Sickness Error Google Drive Windows Server 2008 Device Management Wasting Time Saving ZTime Managing IT Services IT Plan Scalability Enterprise Resource Planning Shortcut Logistics Virtual Machines Spyware Mobile Payment Troubleshooting Content Management Bookmark Surveillance Advertising email scam Messenger Flash Addiction Tracking Entrepreneur Business Managemenet Cyber security Telework CIO Accountants A.I. Debate IT Windows XP Rental Service Environment Google Play Telephone Service Harddrive Remote Workers Staffing Google Wallet Electricity Printing HIPAA Employer/Employee Relationships Best Practives Displays Wireless Headphones Web Server Electronic Payment online Currency Managing Costs Virtual Private Network Society Migration Connected Devices Cabling Competition Microsoft 365 GPS cache Television Business Owner Browsers External Harddrive Development Books Network Management Workers Medical IT Trend Micro Microserver FinTech Micrsooft Equifax Administrator Fleet Tracking Supercomputer LinkedIn Security Cameras Threats Data Storage Drones Device security MSP WannaCry User Tip IP Address Proactive Maintenance Reviews Nanotechnology Social Network Time Management Freedom of Information Navigation Human Resources Virtual Machine Thin CLient Procurement Desktop Finance Worker Corporate Profile Application Get More Done 3D Ebay Assessment SharePoint Archive Data Analysis Printer Server Smart Phones Permissions Business Cards Reading Language Service Level Agreement Samsung Skype eCommerce Turn Key Organization Startup Asset Tracking CrashOverride Managing Stress Capital Regulation 3D Printing Productuvuty Personal Information Financial