Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
conficker-worm — Part 01
Page 27
27 / 51
Rev.01-31-2003
FEderAL BUReAu OF invesTigAtiOn
Precedence: RouTINE
Date: 10/27/2009
To:
Cyber
Attn:
TFU-1
SSA
b6
b7C
Prom:
Phoenix
C-2
Contact:
SA
Approved By:.
b3
b6
b7C
b7D
Drafted By:.
b7E
Case ID #:
(Pending)
(Pending)
Title:
Synopsis:
Reguest
b7E
Details: Writer, who is assigned to the Cybex Squad in Phoenix
is working with a CHs who is
b7D
Note: Conficker Worm was first tracked in November
200s and has infected thousands of business networks and millions
of pCs. Conficker has the capability to launch attacks that can
download code that has the possibility to be devastating to the
Internet.) [Note: Botnet refers to a type of bot running on a.
computer installed with a trojan and connecting to Irc networks
for command and control. Botnets have the capability to steal
,computer users credentials and well as wage Distributed Denial of
Sexvice (DDos) attacks on other systems.)
Chs prefers to communicate via email. CHs is
b7D
b7E
b3
b6
30o 80. e e..
b7C
b7E
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
letter
bureau
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic