9 thoughts on “ZeroAccess Botnet: Is It Preparing Its Next Attack?

  1. I would add never just update, always choose manulal not auto, and uncheck anything else that will come with the update. And most importantly, make sure you are not being re-directed. READ…READ….. THEN CLICK

    • I agree Sheldon. I always hover over any links and see what appears in the bar at the bottom of the screen. THAT is the real destination.

      • The hover over to show the real URL doesn’t always work. If you have an email reader that displays HTML email they can put in a command that when you hover over the first fake URL they substitute yet another fake URL than the one you really go to. Sol use an email reader that doesn’t display HTML. EIther it all stands out in stark relief where you can see it or you have a white page.

  2. I bought software to protect my computer against viruses and other nasties, so why am I being warned to take all these extra precautions? I thought that because I had spent all that money I could stop worrying, secure in the knowledge that if my computer was impregnable to malware, and that even if it were to become infected I could sue in the tort of negligent misstatement (having after all been assured on many occasions that “[my] computer is safe”). Are you now saying I have wasted my money? If so, how do I get a refund? And can I insist upon old fashioned cash – or at worst a cheque – as I obviously cannot trust any on-line banking web-sites.

    • Security must be seen as different layers. You cannot purchase security software and assume it will protect you from everything without you doing your part in being vigilant. It’s like the safety features on your vehicle. Just because you have it, doesn’t mean you can drive recklessly on the road. You need to do your part.

  3. so, since this “program”, seems to be directly towards microsoft’s crap gear, as i understand from this article. what are the wonder boys going to do with that bloated piece of swiss cheese crap? i am truly tired of reformatting my hard drive very 4 or 5 months, to make sure i get any programs a simple reinstall might miss.
    i guess my biggest question is this, what are the virus and malware companies doing to find, and remove this program from personal computers should we manage to become infected. i don’t care that it may never truly be removed from the net. you know it’s there, which means you have found it somewhere. are you saying you can’t get your programs to find,block, or remove that program?
    though i’m beginning to wonder if its worth it, since every program you install seems to have some sort of tracking programmed into it. i’m surprised someone hasn’t written a program to take those operations over.

    • Not sure why you need to reformat your hard drive every 4-5 months; that seems excessive and unnecessary. Next, what security companies are doing is constantly analyzing and researching new and existing malware to enhance their security software. It’s up to the user to be vigilant while on the Web, as we as to make sure their security software (as well as operating system and other applications) are all up-to-date. Also, as mentioned in our blog, since ZeroAccess has no centralized C&C, it’s nearly impossible to take it down.

  4. I have not reformatted my hard drive in the last 3 years, and when i do i will have only to install my 2 terabytes backup from Acronis. I did a few times during my last 10 years with always full success.

  5. I was the target of many attacks in 2014 my router received several cyber attacks on ports 16464 and 16471 use by trojan Sirefef …. Those attacks was made from spoofed (unknown ) IP … only 2 of them i could track … one in Oldenburg Germany and the other one in far away west Trinidad & Tobago islands ….I really think is a gang of professional Hackers behind those persistent attacks …

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>