Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
conficker-worm — Part 01
Page 32
32 / 51
(Rev. 01-31-2003)
fEderal BuReAu Of investigatiOn
Precedence:ROuTINE
Date: 03/16/2010
To:
Cybex
Attn:
I-naL
SSA
b6
From: Phoenix
b7C
C-2
Contact: SA
Approved By:
b3
b6
b7C
b7D
Drafted By:
b7E
VCase. ID #:
(Pending)
(Pending)
Title:
Synopsis: Reauest
b7E
Details: writer, who is assianed to the Cyber Sauad in Phoenix, is.
workina with a Chs who id
b7D
infected thousands of business networks and miilions of pCs.
Conficker has the capability to launch attacks that can download code.
that has the possibility to be devastating to the Internet.) INote:
:
Botnet, refers'to a type of bot. running on a. computer installed with a.
trojan and connecting to IRc networks fox command and control.
Botnets have the capability to steal computer users cxedentials and
well as wage Distxibuted Denial of. Service, (DDos). attacks on. othex
systems.[
chs orefers to communicate via email. cHs is
b7D
b7E
b3
b7E
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
letter
bureau
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic