Підтримка
www.wikidata.uk-ua.nina.az
Komp yuterom zombi v informatici nazivayetsya komp yuter pidklyuchenij do merezhi Internet yakij buv zarazhenij v rezultati hakerskoyi ataki komp yuternim virusom abo troyanskoyu programoyu i mozhe buti vikoristanij dlya vikonannya riznih shkidlivih zadach adzhe zlovmisniki mozhut viddaleno keruvati nim Chasto komp yuteri zombi utvoryuyut botneti dlya rozpovsyudzhennya spamu elektronnoyu poshtoyu i dlya provedennya DoS atak Bilshist vlasnikiv komp yuteriv zombi ne zdogaduyutsya sho yih sistema vikoristovuyetsya z takoyu metoyu Oskilki vlasniki komp yuteriv pro ce ne znayut to yih komp yuteri v perenosnomu sensi mozhut buti porivnyanni z zombi Cikl spamu 1 Vebsajt spamera 2 Spam 3 Spamware 4 Zarazheni komp yuteri 5 Virus abo troyan 6 Poshtovi serveri 7 Koristuvachi 8 Vebtrafik IstoriyaZombi shiroko vikoristovuyutsya dlya vidpravlennya elektronnoyu poshtoyu spamu Stanom na 2005 za ocinkami 50 80 vsogo spamu v sviti bulo nadislano za dopomogoyu komp yuteriv zombi Ce dozvolyaye spameram zalishatis inkognito i jmovirno znizhuye yih vitrati na rozsilku spamu Cej spam takozh znachno spriyaye poshirennyu troyanskih program yaki na vidminu vid virusiv ne samorozmnozhuyutsya Voni pokladayutsya na ruh elektronnoyi poshti abo zbilshennya spamu todi yak hrobaki mozhut poshiryuvatisya za dopomogoyu inshih zasobiv Z tih zhe prichin zombi vikoristovuyutsya takozh dlya zdijsnennya klikfrodu Zombi mozhut buti vikoristani dlya provedennya DoS atak na cilovi sajti Bagato internet koristuvachiv roblyat odnochasni zapiti na server vebsajtu sho privodit do zboyu roboti storinki i zapobigaye vhodu zakonnih koristuvachiv do neyi Odin z variantiv cogo tipu ataki vidomij yak rozpodilena degradaciya v obslugovuvanni Rozpochata za dopomogoyu pulsuyuchih zombi rozpodilena degradaciya v obslugovuvanni ye pomirnim i periodichnim zatoplennyam sajtiv Ce zrobleno z metoyu upovilnennya a ne padinnya sajtu zhertvi Efektivnist ciyeyi taktiki viplivaye z togo faktu sho intensivne zatoplennya mozhe buti legko viyavlene i usunute ale pulsuyuchi zombi ataki i upovilnennya dostupu do sajtu mozhe zalishitisya nepomichenim protyagom bagatoh misyaciv i navit rokiv Vidomi vipadki vidmovi i degradaciyi v obslugovuvanni v minulomu vklyuchayut napad na sluzhbu SPEWS v 2003 roci i odin proti sluzhbi Blue Frog v 2006 roci U 2000 roci kilka vidnih vebsajtiv Yahoo eBay i t d buli zagnani v gluhij kut cherez rozpodilenu ataku z vidmovoyu v obslugovuvanni vstanovlenij na en kanadskim pidlitkom 13 richnij zlochinec z Kenosha shtat Viskonsin buv znajdenij na vebsajti Gibson Research 4 chervnya 2015 u Wayback Machine Stiv Gibson rozibrav bota yakij vikoristovuvavsya yak zombi u ataci i vin prostezhiv lancyuzhok vid nogo do distrib yutora U svoyih doslidzhennyah Gibson opisuye robotu v bot kontrolnomu IRC kanali Pochinayuchi z lipnya 2009 roku podibni mozhlivosti botnetu takozh z yavilisya dlya zrostayuchogo rinku smartfoniv Prikladom mozhe sluguvati stvorennya v lipni 2009 roku pershogo v sviti botnetu zdatnogo na SMS cherv yak yakij oriyentovanij na operacijnu sistemu Symbian ta Nokia smartfoniv Piznishe v tomu zh misyaci Charli Miller prodemonstruvav koncepciyi povidomlennya hrobaka dlya iPhone na konferenciyi Black Hat Takozh v lipni koristuvachi Ob yednanih Arabskih Emirativ stali zhertvoyu shpigunskoyi programi Etisalat BlackBerry V interv yu v serpni 2009 roku z New York Times kiberkonsultant z bezpeki Majkl Gregg uzagalniv pitannya tak Zaraz mi znahodimosya na tij samij stadiyi z telefonami na yakij mi buli z personalnimi komp yuterami u 80 ti roki Najvirogidnishi shlyahi proniknennya bota na komp yuterCherez dodatki v elektronnij poshti Pid chas vidviduvannya sajtiv sumnivnoyi yakosti i zmistu Pid chas zapusku zavantazhenih nadislanih prinesenih program Z prinesenih fleshok ta inshih nosiyiv informaciyiYak zapobigti zarazhennyuDlya togo shob uniknuti zarazhennya prosto uvimknit programu na kshtalt BitDisk osoblivo yaksho Vi zibralisya zrobiti shos iz usogo nazvanogo vishe A koli Vi zakinchite zapuskati rizni nadislani programi vidviduvati sumnivni sajti i virishite povernutisya do roboti prosto perezavantazhte komp yuter i vin bude takij same chistij yak i ranishe Div takozhStudy by IronPort finds 80 of e mail spam sent by Zombie PCs June 28 2006 12 veresnya 2013 u Wayback Machine Botnet operation controlled 1 5 million PCs 24 lipnya 2011 u Wayback Machine Botnet operation controlled 1 5 million PCs 27 grudnya 2015 u Wayback Machine A detailed account of what a zombie machine looks like and what it takes to fix it 27 kvitnya 2006 u Wayback Machine Correspondence between Steve Gibson and Wicked 4 bereznya 2016 u Wayback Machine Zombie networks comment spam and referer sic spam 24 lyutogo 2021 u Wayback Machine The New York Times Phone Hacking Threat is Low But It Exists 29 listopada 2014 u Wayback Machine Hackers Target Cell Phones WPLG TV ABC 10 Miami 26 chervnya 2015 u Wayback Machine Researcher BlackBerry Spyware Wasn t Ready for Prime Time 29 listopada 2014 u Wayback Machine Forbes How to Hijack Every iPhone in the World Arhivovano 2 sichnya 2013 u Archive is Hackers Plan to Clobber the Cloud Spy on Blackberries 5 chervnya 2011 u Wayback Machine PrimitkiTom Spring Spam Slayer Slaying Spam Spewing Zombie PCs PC World 2005 06 20 White Jay D 2007 Managing Information in the Public Sector M E Sharpe p 221 ISBN 0 7656 1748 X Weisman Steve 2008 The Truth about Avoiding Scams FT Press p 201 ISBN 0 13 233385 6 Schwabach Aaron 2006 Internet and the Law ABC CLIO p 325 ISBN 1 85109 731 7 Steve Gibson The Attacks on GRC COM Gibson Research Corporation first 2001 05 04 last 2009 08 12 Arhiv originalu za 11 serpnya 2015 Procitovano 4 chervnya 2015
Топ