<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Spyware Techie &#187; Botnet</title>
	<atom:link href="https://spyware-techie.com/tag/botnet/feed" rel="self" type="application/rss+xml" />
	<link>https://spyware-techie.com</link>
	<description>A techie’s take on Spyware.</description>
	<lastBuildDate>Mon, 28 Dec 2020 09:27:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5</generator>
		<item>
		<title>Omg Mirai Botnet Turns Iot Devices Into Proxy Servers</title>
		<link>https://spyware-techie.com/omg-mirai-botnet-turns-iot-devices-into-proxy-servers</link>
		<comments>https://spyware-techie.com/omg-mirai-botnet-turns-iot-devices-into-proxy-servers#comments</comments>
		<pubDate>Mon, 26 Feb 2018 16:54:23 +0000</pubDate>
		<dc:creator>Scott</dc:creator>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Mirai]]></category>
		<category><![CDATA[Omg]]></category>

		<guid isPermaLink="false">http://www.spyware-techie.com/?p=206721</guid>
		<description><![CDATA[OMG is not us being all trendy using such a "cute" acronym, but it is indeed the name of a dangerous threat that has surfaced recently. Our researchers say that this malware infection is the new version of Mirai malware. &#8230; <a href="https://spyware-techie.com/omg-mirai-botnet-turns-iot-devices-into-proxy-servers">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/omg-mirai-botnet-turns-iot-devices-into-proxy-servers/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>FBI, Microsoft, ESET and others kill Andromeda Botnet</title>
		<link>https://spyware-techie.com/fbi-microsoft-eset-and-others-kill-andromeda-botnet</link>
		<comments>https://spyware-techie.com/fbi-microsoft-eset-and-others-kill-andromeda-botnet#comments</comments>
		<pubDate>Wed, 06 Dec 2017 17:40:48 +0000</pubDate>
		<dc:creator>Scott</dc:creator>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[Andromeda]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Microsoft]]></category>

		<guid isPermaLink="false">http://www.spyware-techie.com/?p=197721</guid>
		<description><![CDATA[After two years of intense research, international public and private effort finally took down the notorious Andromeda botnet network on November 29th. Andromeda was one of the biggest botnets out there, used to distribute malware and steal information from infected &#8230; <a href="https://spyware-techie.com/fbi-microsoft-eset-and-others-kill-andromeda-botnet">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/fbi-microsoft-eset-and-others-kill-andromeda-botnet/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Necurs Botnet has revived and is now involved in the distribution of Globeimposter Ransomware</title>
		<link>https://spyware-techie.com/the-necurs-botnet-has-revived-and-is-now-involved-in-the-distribution-of-globeimposter-ransomware</link>
		<comments>https://spyware-techie.com/the-necurs-botnet-has-revived-and-is-now-involved-in-the-distribution-of-globeimposter-ransomware#comments</comments>
		<pubDate>Mon, 04 Dec 2017 10:16:54 +0000</pubDate>
		<dc:creator>Scott</dc:creator>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Globeimposter Ransomware]]></category>
		<category><![CDATA[Necurs]]></category>

		<guid isPermaLink="false">http://www.spyware-techie.com/?p=197361</guid>
		<description><![CDATA[Necurs is the name of the botnet actively distributing malicious software. It used to spread the nasty infection Locky Ransomware, but this report is not about this case. Malware researchers working at the cybersecurity department noticed another flow of malicious &#8230; <a href="https://spyware-techie.com/the-necurs-botnet-has-revived-and-is-now-involved-in-the-distribution-of-globeimposter-ransomware">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/the-necurs-botnet-has-revived-and-is-now-involved-in-the-distribution-of-globeimposter-ransomware/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Sockbot Spread via 8 Apps on the Google Play Store</title>
		<link>https://spyware-techie.com/sockbot-malware-turns-android-devices-into-botnet</link>
		<comments>https://spyware-techie.com/sockbot-malware-turns-android-devices-into-botnet#comments</comments>
		<pubDate>Wed, 25 Oct 2017 08:37:12 +0000</pubDate>
		<dc:creator>Scott</dc:creator>
				<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Sockbot]]></category>

		<guid isPermaLink="false">http://www.spyware-techie.com/?p=192761</guid>
		<description><![CDATA[Do you use an Android device? If you do, are you cautious? Unfortunately, many Android users are pretty careless when it comes to the installation of new apps. Google Play Store comes pre-installed with every Android OS, and, generally, it &#8230; <a href="https://spyware-techie.com/sockbot-malware-turns-android-devices-into-botnet">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/sockbot-malware-turns-android-devices-into-botnet/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Srizbi Botnet Makes a Come-Back after Security Firm&#039;s Shut-Down Attempts</title>
		<link>https://spyware-techie.com/srizbi-botnet-makes-come-back</link>
		<comments>https://spyware-techie.com/srizbi-botnet-makes-come-back#comments</comments>
		<pubDate>Thu, 27 Nov 2008 20:11:59 +0000</pubDate>
		<dc:creator>Allen</dc:creator>
				<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[FireEye]]></category>
		<category><![CDATA[McColo]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[spam messages]]></category>
		<category><![CDATA[Srizbi]]></category>
		<category><![CDATA[Srizbi Botnet]]></category>

		<guid isPermaLink="false">http://www.spyware-techie.com/?p=2073</guid>
		<description><![CDATA[The creator of the Srizbi Botnet seems to be very witty with the actions that have allowed the Srizbi Botnet to re-emerge despite the actions of the security community. The Srizbi Botnet may be one of the most infamous spamming &#8230; <a href="https://spyware-techie.com/srizbi-botnet-makes-come-back">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/srizbi-botnet-makes-come-back/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
