Microsoft wins court approval to topple botnet

Reuters
Thursday 25 February 2010 11:20 GMT
Comments

Your support helps us to tell the story

As your White House correspondent, I ask the tough questions and seek the answers that matter.

Your support enables me to be in the room, pressing for transparency and accountability. Without your contributions, we wouldn't have the resources to challenge those in power.

Your donation makes it possible for us to keep doing this important work, keeping you informed every step of the way to the November election

Head shot of Andrew Feinberg

Andrew Feinberg

White House Correspondent

Software giant Microsoft Corp has won a US court approval to deactivate a global network of computers that the company accused of spreading spam and harmful computer codes, the Wall Street Journal said.

A federal judge in Alexandria, Virginia, granted a request by Microsoft to deactivate 277 Internet domains, which the software maker said is linked to a "botnet," the paper said.

A botnet is an army of infected computers that hackers can control from a central machine.

The company aims to secretly sever communications channels to the botnet before its operators can re-establish links to the network, the paper said.

Microsoft on Monday filed a suit that targets a botnet identified as Waledac, the paper said.

Judge Brinkema's order required VeriSign Inc, an Internet security and naming services provider, to temporarily turn off the suspect Internet addresses, the paper said.

Microsoft could not be immediately reached for comment by Reuters outside regular U.S. business hours.

On 18 February, Internet security firm NetWitness said in a report that a new type of computer virus is known to have breached almost 75,000 computers in 2,500 organizations around the world, including user accounts of popular social network websites.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in