SENKI
Scaling this thing we call the "Internet" – Barry's Security & Resilency Blog
  • Operator’s Security Toolkit
    • Preparing for DOS Attacks – the Essentials
    • BGP Route Hijack – What can be done Today?
    • Filtering Exploitable Ports and Minimizing Risk from the Internet and from Your Customers
    • Remote Triggered Black Hole (RTBH) Filtering
    • Open Source Threat Intelligence Feeds
    • Remediating Violated Customers
    • SLA as a Security Tool
    • Monitoring Your Network for Malware, SPAM, BOTNET, and other Infections
    • Study Materials for Operational Security and DOS Defense
      • US’s National Strategy to Secure Cyberspace (2003)
  • Network Operations & Scaling
    • ISP Workshop Program
      • ITU Africa Telecom 98 IXP Demonstration
      • Singapore Internet Backbone (SIB)
    • The Service Provider Security “Bootcamp”
      • June 2014 Workshop Slides
      • Indonesia SP Workshops
      • CommunicAsia 2015
      • APRICOT 2012 Network Security Workshop
      • June 2014 Workshop Slides
      • Telecoms Security Workshop 2012
      • MAAWG 2012 Security Workshop
    • Public Cloud DNS Resolvers (which offer services)
    • DNS Latency and Performance Test Tools
    • US’s National Strategy to Secure Cyberspace (2003)
    • Network Operations Groups (NOGs)
  • Vendor Security
    • Demanding Security from your Vendors
    • IoT Security Standards & Frameworks
  • Empowerment
    • Leveraging Credit Cards – Principles that Maximize Gain while Preventing Pain
    • Effective Linkedin Connections – Building Your Network
    • Building and Investing in a Community of “Contacts”
    • Best Principles for Using Linkedin for Social Selling
    • Programs that Empower Women Engineers
  • About Senki
    • Stay Connected with Senki’s Updates
    • Barry’s BIO
    • I’ve got an exciting opportunity for you ….

Tag: Conficker

Conficker - the "Fortunate 500"

Conficker – the “Fortunate 500”

Posted on December 16, 2009June 3, 2017 by Barry Greene

Conficker has been a dual edge sword to the industry. On one hand, it a nasty “weapons grade” hijacking malware with nefarious consequences – ranging from a platform for crime to a threat  Global Telecom’s, SCADA, and other critical infrastructure.  On the other hand, it is an example of what cyber-civic society can do when Read More

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to email this to a friend (Opens in new window)
  • Click to print (Opens in new window)

Like this:

Like Loading...
Posted in Security, Resiliency, and Scaling Tagged BOTNETs, Conficker, Conficker Working Group, critical Internet threats, hijacking malware, malware, Shadowserver

Categories

  • Cyberwar
  • Empowering Humanity
  • Internet
  • Operator's Security Toolkit
  • Scaling
  • Security, Resiliency, and Scaling
  • Telecom
  • Threat Actors
  • Uncategorized
  • Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
    To find out more, including how to control cookies, see here: Cookie Policy
Theme by Out the Box
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.
%d bloggers like this: