ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft Thwarts Major Hacking Attempt

Microsoft Thwarts Major Hacking Attempt

With the 2020 U.S. Election under a month away, there has been a lot of concern that outside interests would try to influence the results. Microsoft has recently disrupted a huge coordinated hacking effort that had designs of altering the election infrastructure needed for a fair and secure election. Let’s take a look at the effort and Microsoft’s response in today’s blog.

The Skinny

Microsoft and The United States Cyber Command (USCYBERCOM) announced early on October 12, 2020 that they took down the servers that fueled an enormous botnet called TrickBot, but walked it back when it was evident that the botnet was resilient enough to stay up even as their central servers were taken down. Industry professionals described the action as “kneecapping” the botnet rather than “cutting off its head”. Most predict TrickBot to make a comeback. 

TrickBot has an estimated one million devices that have been hijacked and infected with the botnet’s malicious code. Based out of Russia, it is believed that the TrickBot botnet was intent on deploying strategic ransomware attacks to disrupt the 2020 U.S. Presidential election.

Taking Down TrickBot

After the events of the 2016 U.S. Presidential election, most cybersecurity professionals were on the lookout for cybercriminal organizations looking to influence or interrupt the legitimacy of the election. For their part, Microsoft had already warned election officials that several Russian, Iranian, and Chinese hacking collectives are targeting not only the candidates, but also the election infrastructure itself. 

To disrupt the TrickBot’s operational command, Microsoft, USCYBERCOM, and National Security Agency operators were able to send a command to all zombies in the botnet to disconnect themselves after which they were able to flood the TrickBot’s database with millions of false records. 

While it is reported that the TrickBot remains active, the unprecedented effort actually set a legal precedent. Microsoft’s legal team successfully argued that TrickBot abused Windows code for malicious purposes, which stands in breach of the Windows software development kit’s terms of service. By successfully arguing that TrickBot was infringing on their copyright, Microsoft got legal clearance to take down the Malware as a Service.

With a legal precedent, now Microsoft, or any other software company can work to mitigate more malware attacks using their software. 

Do you think that the election is in danger because of foreign hackers? What should be done about it? Leave your thoughts in the comment section below.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup Smartphone communications Small Business Upgrade Smartphones Microsoft Office Mobile Devices Network Communication Data Recovery Managed IT Services Quick Tips Productivity VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Disaster Recovery Covid-19 Passwords Holiday Windows 10 Browser Apps IT Support Managed Service Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Internet of Things Data Management Remote Work Saving Money Operating System Government Workplace Strategy Artificial Intelligence Managed IT services Gadgets Networking Windows Spam Business Technology Blockchain Bandwidth Encryption Mobile Device Management Server Information Remote App Virtualization WiFi Information Technology Office 365 History Budget Gmail Office Employee/Employer Relationship Apple Two-factor Authentication BDR Cybercrime Wi-Fi Conferencing Health Access Control Data Security Big Data Analytics Remote Monitoring Document Management Voice over Internet Protocol Hacker Save Money IT Management Training Employer-Employee Relationship Compliance Help Desk Patch Management Remote Computing Hacking Cost Management Vendor Project Management Vulnerabilities Legal Data storage Mobile Office Money Customer Service Unified Threat Management Managed Services Search... Firewall Best Practice Data loss Augmented Reality Word Retail BYOD Alert IBM Website Computing Vendor Management Hiring/Firing Hard Drive Outlook Password Applications Law Enforcement End of Support Laptop Printer Monitoring Healthcare Websites Mobile Computing Remote Workers Mobility Meetings Windows 11 Marketing Windows 7 Social Free Resource Sports Travel SaaS DDoS Virtual Reality Running Cable Google Maps Social Engineering Scam Cryptocurrency Black Market How To Storage iPhone Cleaning Education Cortana VPN Robot Content Filtering Update Router User Data Breach Paperless Office The Internet of Things YouTube Antivirus Twitter Maintenance Chrome Virtual Machines Wireless Technology Microchip eWaste Computer Repair Flexibility Multi-factor Authentication PowerPoint Start Menu Professional Services Downloads Administration Computer Care Downtime Hack Safety Identity Theft Presentation Notifications Vulnerability Saving Time Unified Communications Specifications Virtual Desktop IT Consultant Software as a Service Managed Services Provider Data Protection Computers Bitcoin Experience Google Docs Bluetooth Virtual Private Network Distributed Denial of Service Telephone Customer Relationship Management Co-Managed IT Office Tips Memory Entertainment Current Events Private Cloud Excel Solutions Disaster Tech Terms Images 101 Integration Politics Machine Learning Settings Lithium-ion battery Display Managed IT Digital Virtual Assistant Solid State Drive HIPAA Processors Employees Taxes Avoiding Downtime Holidays Chromebook Drones Processor Automobile Cooperation Video Conferencing Physical Security How To Legislation News Medical IT Keyboard User Tip Shopping Hard Drives Printing Evernote Paperless Inbound Marketing Network Management CCTV SQL Server In Internet of Things intranet Touchscreen PCI DSS Licensing Emails Humor Computer Malfunction Fake News Wireless Hacks Shortcut Network Congestion Emergency Proxy Server Gig Economy Heating/Cooling Writing Business Communications Environment Vendor Mangement Service Level Agreement Internet Service Provider Computing Infrastructure Azure Reliable Computing Smart Technology Windows XP Social Networking Electronic Payment Management Regulations Compliance Samsung Device security Managed IT Service Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Tech Human Resources Business Mangement Going Green Net Neutrality Business Cards Scalability Administrator Text Messaging Proactive IT Error Financial Data Phone System Tablets IT Bring Your Own Device Bookmark Risk Management Google Calendar Term Google Apps Download Supercomputer Piracy Supply Chain Music Virus Telework HTML Nanotechnology Communitications Motion Sickness Microsoft 365 Staffing Browsers Smartwatch IP Address Comparison Google Play Google Drive Upload Procurement Computer Accessories Software License Workplace Botnet Social Network FinTech Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Rental Service Micrsooft Flash Television Security Cameras Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value Cabling Devices Cyber security Scams Telephone Systems Business Growth Customer Resource management Organization Fileless Malware Tablet Smart Devices G Suite Tip of the week Recovery Competition Mouse VoIP Gamification Remote Working Tracking Company Culture Regulations Trend Micro Cables LiFi Banking Entrepreneur Google Wallet Telephone System AI Application Deep Learning Directions Digital Security Cameras Troubleshooting Backup and Disaster Recovery Electronic Health Records Web Server Transportation Documents Messenger SharePoint Business Intelligence Content Digital Payment Desktop Wasting Time Worker Accountants eCommerce Point of Sale Modem Business Metrics Hosted Solution Electronic Medical Records Videos Access Database Surveillance Securty Books Domains Language Society Time Management Public Cloud Managing Costs Shortcuts Equifax SSID Health IT Monitors Audit Media Visible Light Communication Business Owner Spyware Tactics Development Hard Drive Disposal Employer/Employee Relationships Reading Windows 8 Username File Sharing Virtual Machine Be Proactive Startup Optimization Freedom of Information Redundancy Reviews Public Speaking Displays Navigation 2FA Advertising Cache Addiction email scam Teamwork Relocation Workplace Strategies Streaming Media Work/Life Balance Tech Support Unified Threat Management Data Storage Workers Mobile Security Hypervisor

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?