![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKOFnyYIiV_rD8PqgYp4jGt2cbAW6CQbZkFyoW0XKBAx6UrW7zyF_vvTqdtCMZ2C7K5IGczsJ78B3Vm-9LaWQ-cgZth_wSX42KSUP9QHXN_AwdjA_525cidV5oBXkiPrv9AurAp4DpKsA/s400/tdl4_pic13_all_610x375.png)
![]() |
Old style botnet with central command structure. Suggested by Brian Hall. |
Malicious code sneaks into the very first sector of the hard drive, the part which lights up before the operating system is turned on. TDL-4 uses strong encryption and circulates its evil messages in a loose peer-to-peer network instead of along a rigid pipeline that is easier to police.
No comments:
Post a Comment