Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Background  





2 Current status  





3 References  














Coreflood







Add links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


Coreflood is a trojan horse and botnet created by a group of Russian hackers and released in 2010. The FBI included on its list of infected systems "approximately 17 state or local government agencies, including one police department; three airports; two defense contractors; five banks or financial institutions; approximately 30 colleges or universities; approximately 20 hospital or health care companies; and hundreds of businesses."[1] It is present on more than 2.3 million computers worldwide and as of May 2011 remains a threat.

Background[edit]

Backdoor.Coreflood is a trojan horse that opens a back door on the compromised computer. It acts as a keylogger and gathers user information.[2]

Current status[edit]

The FBI has the capability, and recently authorization from the courts, to delete Coreflood from infected computers after receiving written consent. The FBI has reduced the size of the botnet by 90% in the United States and 75% around the world.[3]

References[edit]

  1. ^ "Coordinated Law Enforcement Action Leads to Massive Reduction in Size of International Botnet « USDOJ: Justice Blog". Archived from the original on 2011-10-15. Retrieved 2011-10-11.
  • ^ "Backdoor.Coreflood". Symantec. November 29, 2002. Archived from the original on January 7, 2007. Retrieved May 3, 2011.
  • ^ "US authorities to delete Coreflood bot from computers". April 29, 2011. Retrieved May 2, 2011.
  • Hacking in the 2010s

    2020s →

    Major incidents

    2010

  • Australian cyberattacks
  • Operation Olympic Games
  • Operation ShadowNet
  • Operation Payback
  • 2011

  • DigiNotar
  • DNSChanger
  • HBGary Federal
  • Operation AntiSec
  • PlayStation network outage
  • RSA SecurID compromise
  • 2012

  • Stratfor email leak
  • Operation High Roller
  • 2013

  • Snapchat hack
  • Cyberterrorism attack of June 25
  • 2013 Yahoo! data breach
  • Singapore cyberattacks
  • 2014

  • Operation Tovar
  • 2014 celebrity nude photo leak
  • 2014 JPMorgan Chase data breach
  • 2014 Sony Pictures hack
  • Russian hacker password theft
  • 2014 Yahoo! data breach
  • 2015

  • Hacking Team
  • Ashley Madison data breach
  • VTech data breach
  • Ukrainian Power Grid Cyberattack
  • SWIFT banking hack
  • 2016

  • Hollywood Presbyterian Medical Center ransomware incident
  • Commission on Elections data breach
  • Democratic National Committee cyber attacks
  • Vietnam Airport Hacks
  • DCCC cyber attacks
  • Indian Bank data breaches
  • Surkov leaks
  • Dyn cyberattack
  • Russian interference in the 2016 U.S. elections
  • 2016 Bitfinex hack
  • 2017

  • 2017 Macron e-mail leaks
  • WannaCry ransomware attack
  • Westminster data breach
  • Petya and NotPetya
  • Vault7 data breach
  • Equifax data breach
  • Deloitte breach
  • Disqus breach
  • 2018

  • Atlanta cyberattack
  • SingHealth data breach
  • 2019

  • Baltimore ransomware attack
  • Bulgarian revenue agency hack
  • WhatsApp snooping scandal
  • Jeff Bezos phone hacking incident
  • Hacktivism

  • CyberBerkut
  • GNAA
  • Goatse Security
  • Lizard Squad
  • LulzRaft
  • LulzSec
  • New World Hackers
  • NullCrew
  • OurMine
  • PayPal 14
  • RedHack
  • Teamp0ison
  • TDO
  • UGNazi
  • Ukrainian Cyber Alliance
  • Advanced
    persistent threats

  • Bureau 121
  • Charming Kitten
  • Cozy Bear
  • Dark Basin
  • DarkMatter
  • Elfin Team
  • Equation Group
  • Fancy Bear
  • GOSSIPGIRL (confederation)
  • Guccifer 2.0
  • Hacking Team
  • Helix Kitten
  • Iranian Cyber Army
  • Lazarus Group (BlueNorOff) (AndAriel)
  • NSO Group
  • Numbered Panda
  • PLA Unit 61398
  • PLA Unit 61486
  • PLATINUM
  • Pranknet
  • Red Apollo
  • Rocket Kitten
  • Stealth Falcon
  • Syrian Electronic Army
  • Tailored Access Operations
  • The Shadow Brokers
  • xDedic
  • Yemen Cyber Army
  • Individuals

  • George Hotz
  • Guccifer
  • Jeremy Hammond
  • Junaid Hussain
  • Kristoffer von Hassel
  • Mustafa Al-Bassam
  • MLT
  • Ryan Ackroyd
  • Sabu
  • Topiary
  • Track2
  • The Jester
  • Major vulnerabilities
    publicly disclosed

  • iSeeYou (2013)
  • Heartbleed (2014)
  • Shellshock (2014)
  • POODLE (2014)
  • Rootpipe (2014)
  • Row hammer (2014)
  • SS7 vulnerabilities (2014)
  • WinShock (2014)
  • JASBUG (2015)
  • Stagefright (2015)
  • DROWN (2016)
  • Badlock (2016)
  • Dirty COW (2016)
  • Cloudbleed (2017)
  • Broadcom Wi-Fi (2017)
  • EternalBlue (2017)
  • DoublePulsar (2017)
  • Silent Bob is Silent (2017)
  • KRACK (2017)
  • ROCA vulnerability (2017)
  • BlueBorne (2017)
  • Meltdown (2018)
  • Spectre (2018)
  • EFAIL (2018)
  • Exactis (2018)
  • Speculative Store Bypass (2018)
  • Lazy FP state restore (2018)
  • TLBleed (2018)
  • SigSpoof (2018)
  • Foreshadow (2018)
  • Dragonblood (2019)
  • Microarchitectural Data Sampling (2019)
  • BlueKeep (2019)
  • Kr00k (2019)
  • Malware

    2010

  • Black Energy 2
  • SpyEye
  • Stuxnet
  • 2011

  • Alureon
  • Duqu
  • Kelihos
  • Metulji botnet
  • Stars
  • 2012

  • Dexter
  • FBI
  • Flame
  • Mahdi
  • Red October
  • Shamoon
  • 2013

  • DarkSeoul
  • 2014

  • Black Energy 3
  • Carbanak
  • Careto
  • DarkHotel
  • Duqu 2.0
  • FinFisher
  • Gameover ZeuS
  • Regin
  • 2015

  • Hidden Tear
  • Rombertik
  • TeslaCrypt
  • 2016

  • Jigsaw
  • KeRanger
  • Necurs
  • MEMZ
  • Mirai
  • Pegasus
  • Petya and NotPetya
  • X-Agent
  • 2017

  • Kirk
  • LogicLocker
  • Rensenware
  • Triton
  • WannaCry
  • XafeCopy
  • 2018

    2019

  • Joanap
  • NetTraveler
  • R2D2
  • Tinba
  • Titanium
  • ZeroAccess botnet

  • t
  • e

  • Retrieved from "https://en.wikipedia.org/w/index.php?title=Coreflood&oldid=1221433303"

    Categories: 
    Botnets
    Windows trojans
    Malware stubs
    Hidden categories: 
    Articles with short description
    Short description matches Wikidata
    All stub articles
     



    This page was last edited on 29 April 2024, at 22:38 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki