Skip to content
SENKI
Scaling this thing we call the "Internet" – Barry's Security & Resilency Blog
  • DDoS Attack Preparation Workbook
    • DDoS Extortionist’s Behaviors
    • Expected DoS Attacks – 10 Steps to Prepare for the Pain
    • 7 Habits of Highly Effective Cyber-Criminals
    • BGP Route Hijack – What can be done Today?
    • Preparing for DOS Attacks – the Essentials
      • Filtering Exploitable Ports and Minimizing Risk from the Internet and from Your Customers
      • Remote Triggered Black Hole (RTBH) Filtering
      • Monitoring Your Network for Malware, SPAM, BOTNET, and other Infections
      • Study Materials for Operational Security and DOS Defense
        • US’s National Strategy to Secure Cyberspace (2003)
      • SLA as a Security Tool
      • Remediating Violated Customers
      • Open Source Threat Intelligence Feeds
  • Operator’s Security & Resiliency Toolkit
    • Operator’s Security Toolkit – Main Page
      • The Service Provider Security “Bootcamp”
        • June 2014 Workshop Slides
        • Indonesia SP Workshops
        • CommunicAsia 2015
        • APRICOT 2012 Network Security Workshop
        • June 2014 Workshop Slides
        • Telecoms Security Workshop 2012
        • MAAWG 2012 Security Workshop
    • Network Operations & Scaling
      • ISP Workshop Program
        • ITU Africa Telecom 98 IXP Demonstration
        • Singapore Internet Backbone (SIB)
      • Public Cloud DNS Resolvers (which offer services)
      • DNS Latency and Performance Test Tools
      • Network Operations Groups (NOGs)
    • Vendor Security
      • Meaningful Security Conversations with your Vendors
      • IoT Security Standards & Frameworks
  • Empowerment
    • Leveraging Credit Cards – Principles that Maximize Gain while Preventing Pain
    • Effective Linkedin Connections – Building Your Network
    • Building and Investing in a Community of “Contacts”
    • Best Principles for Using Linkedin for Social Selling
    • Programs that Empower Women Engineers
  • About Senki
    • Conference Talks, Workshops, and Webinars
    • Stay Connected with Senki’s Updates
    • Barry’s BIO
    • I’ve got an exciting opportunity for you ….

Tag: critical Internet threats

Conficker - the "Fortunate 500"

Conficker – the “Fortunate 500”

Posted on December 16, 2009June 3, 2017 by Barry Greene

Conficker has been a dual edge sword to the industry. On one hand, it a nasty “weapons grade” hijacking malware with nefarious consequences – ranging from a platform for crime to a threat  Global Telecom’s, SCADA, and other critical infrastructure.  On the other hand, it is an example of what cyber-civic society can do when Read More

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to email this to a friend (Opens in new window)
  • Click to print (Opens in new window)

Like this:

Like Loading...
Posted in Security, Resiliency, and Scaling Tagged BOTNETs, Conficker, Conficker Working Group, critical Internet threats, hijacking malware, malware, Shadowserver

Categories

  • Conferences, Webinars, & Workshops
  • Cyberwar
  • DoD, DDoS, and Denial of Service
  • Empowering Humanity
  • Internet
  • Operator's Security Toolkit
  • Scaling
  • Security, Resiliency, and Scaling
  • Telecom
  • Threat Actors
  • Uncategorized
  • Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
    To find out more, including how to control cookies, see here: Cookie Policy
Theme by Out the Box
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.
%d bloggers like this: