Microsoft Wins Court Order to Block 18 Internet Addresses Used by Hackers

Microsoft has won a court battle on Thursday that would block 18 Internet addresses used by hackers, Reuters reports.

Three years ago, the Redmond, Washington-based company filed a lawsuit in Texas against organized online criminals, who have used a large network of infected computers globally.

On Thursday, the company gladly announced that they have won a court ruling that would direct Internet service providers to block 18 Internet addresses used to carry out fraudulent activities to the compromised computers.

In some European countries, warrants that will legally confiscate servers that might contain evidences related to the bosses of the ZeroAccess botnet, were delivered by law enforcement simultaneously.

ZeroAccess botnet comes as a trojan horse that usually affects Windows operating systems. It downloads malicious software on a compromised computer that would pave way for stealing Bitcoin and click fraud.

This is Microsoft’s eighth effort to go against botnet.

Recently, the software giant had opened a new Cybercrime Center in Redmond that uses new tools in its act to combat Internet crimes and now they can do it much better through the help of a provision in trademark that permits pre-trial apprehension of possible counterfeited goods or websites that are scattering infected versions of the Internet Explorer browser.

Microsoft is also working with Internet service providers to alert users of infected computers and the national computer security authorities in different countries, hopeful that they can notify each of the users before the online criminals can disseminate new instructions.

Richard Boscovich, Assistant General Counsel of Microsoft, said in the report that through the cooperation of national agencies in Germany, Latvia, Luxembourg, Netherlands, and Switzerland, the fraudulent activities performed by this botnet was put to a stop temporarily.

He added that the operators of the network are believed to be in Russia and the author of the malware distributed on it could be functioning in another place.

Real Time Analytics