• Register

Data Net Blog

Microsoft Thwarts Major Hacking Attempt, For Now

Microsoft Thwarts Major Hacking Attempt, For Now

With just shy of a month before the 2020 United States Election, there has been quite a bit of concern over the idea that external interests may try to sway the results—and it seems for good reason. Only recently, Microsoft interrupted a massive coordinated hacking plot that could have altered the very infrastructure needed to support a fair election. Let’s examine this plot, and what Microsoft did, in some more detail.

The Situation

In a joint statement on October 12, 2020, the United States Cyber Command (USCYBERCOM) and Microsoft revealed that an enormous botnet had been discovered and dubbed TrickBot. While the servers that powered the attack were initially taken down, their efforts were walked back when TrickBot proved resilient enough to remain in operation. With many industry professionals expecting TrickBot to resurge, these efforts can more accurately be described as “kneecapping” the botnet than it would be to say they “cut off its head.”

This Russian-based botnet has hijacked an estimated one million devices and is believed to be intended to disrupt the 2020 election through strategic ransomware attacks and infections.

Disarming TrickBot

After the 2016 U.S. Presidential election, cybersecurity professionals were on the alert for cybercriminal organizations seeking to manipulate or invalidate the election. Microsoft has already alerted election officials of hacking collectives based in Russia, Iran, and China that were targeting both the candidates and the election infrastructure.

When it came to TrickBot and interrupting its operational command, operators from the National Security Agency, Microsoft, and USCYBERCOM were able to send a disconnect command to all the zombified devices that made up the botnet. Once that was accomplished, they flooded Trickbot’s database with millions of falsified records.

While TrickBot is still active, this effort actually established legal precedent. As TrickBot abused Window’s code for its own malicious purposes, Microsoft’s legal team was able to argue that it was in breach of Windows software development kit’s term of service. This meant that TrickBot constituted copyright infringement, and therefore cleared Microsoft to legally take down the Malware as a Service.

Therefore, TrickBot establishes the precedent that any software company is free to pursue malware attacks that utilize their software.

What do you think? Will software developers take a stronger stance against hackers that use their code now that the precedent to do so is there? How concerned are you about election security? Let us know in the comments.

Powerful Project Tools in the Cloud
Practical Uses for AI in Businesses of Any Size


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, November 28, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Data Efficiency IT Support Privacy Communication Smartphones Hackers Malware Workplace Tips Microsoft Google User Tips Users Hardware Email Small Business Innovation Cloud Software Mobile Device VoIp Communications Managed IT Services Computer Cybersecurity Business Mobile Devices Tech Term Collaboration Android Internet Hosted Solutions Business Management Ransomware Miscellaneous Outsourced IT Cloud Computing Managed Service Network Social Media Windows 10 Phishing IT Services Passwords Backup Covid-19 Saving Money Upgrade Browser Information Smartphone Data recovery Apps Remote Holiday Gadgets Data Backup Wi-Fi Internet of Things Windows Wireless Microsoft Office Facebook Networking Applications Bandwidth VPN Quick Tips Gmail Marketing BDR Blockchain Access Control Chrome Data Breach Remote Work Compliance Apple Automation Managed IT services Mobile Office Save Money Office 365 Patch Management Employer-Employee Relationship Analytics Value Health Business Intelligence Voice over Internet Protocol Going Green Conferencing Router Word Managed IT Service Laptop Employee-Employer Relationship Settings Paperless Office Telephone System Medical IT Mobile Device Management Physical Security Telephony Business Continuity Payment Cards Connectivity Data Management Company Culture Disaster Recovery Social Network Excel Business Technology Scam Battery Tech Terms Cost Management Healthcare Computers Cortana Processor Net Neutrality Wireless Charging Government Remote Computing G Suite Data Security Twitter iPhone Artificial Intelligence Mobility Cybercrime Office Virtual Assistant Education Virtualization Remote Monitoring Password Bring Your Own Device Batteries RAM Training Virus Content Filtering Remote Monitoring and Management How To Server Windows 7 Retail Data Protection WiFi Tablet Hybrid Cloud Staff Outlook E-Commerce Bitcoin Management IT Management Mobile Security Video Co-Managed IT Tech Support Microsoft Teams Security Cameras Risk Management Recovery WannaCry Printing Hard Drives Electronic Health Records Vendor Tip of the Week/Security User Security Profiles Comparison Time Management Insurance Printer Remote Support Workers A.I. Server Management Humor Alert Vulnerability Digital Cables Websites Profitability Payment Remote Working Cleaning Tip of the week SaaS Operating System Customer Service Holidays Telecommute Wearables Virtual Reality HIPAA Paper SSD SharePoint Voice over IP Updates Shadow IT Specifications Chrome OS File Management Encryption File Sharing Millennials Movies Touchscreen Memes Knowledge Safety Eliminating Downtime instant Messaging Threats GDPR OneNote Managing Stress Data loss Hard Drive Ink Employees Distribution Virtual Private Network Reviews Microsoft Office 365 Certification Database Congratulations Computer Repair Lead Generation Maintenance Big Data Plug-In Technology Tips Current Events Innovations IT Travel Edge BYOD Vulnerabilities Scams PCI DSS Botnet Streaming Media Network Attached Storage Storage Environment Windows Server 2008 R2 eCommerce HP Spam Troubleshooting Recycling Remote Workers Processors PowerPoint IT budget Solid State Drive Fleet Management Customer Relationship Management End of Support Unified Communications Authentication Display IT Service WhatsApp Internet Explorer Proactive IT Human Resources Information Technology Website Hosted Desktop Dongle Wireless Internet Cryptocurrency Project Management Regulations Compliance Law Enforcement Telecommuting Downloads Dark Web e-waste Taskbar Sales Online Shopping Document Management Antivirus Update Personal Information News User Tip Spyware Sports Reporting Inventory Hard Disk Drive Multi-Factor Authentication Managed Service Provider Licensing Machine Learning Authorization Tactics Benchmarks Mobile Threat Backup and Disaster Recovery Managed Services Provider YouTube Firewall Live Streaming Amazon Search Meetings Trends Error Help Desk disposal National Security Analysis Financial Thank You Printers Regulation

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123