Microsoft Digital Crimes Unit
Microsoft Digital Crimes Unit
Jump to navigation
Jump to search
Abbreviation | DCU |
---|---|
Purpose | An international legal and technical team of attorneys, investigators, and forensic analysts, with expertise across the areas of malware, botnets, IP crimes, and technology-facilitated child exploitation |
Headquarters | Microsoft Redmond Campus |
Location |
|
Coordinates | Coordinates: 47°38′23″N 122°7′42″W / 47.63972°N 122.12833°W / 47.63972; -122.12833 |
Region served | Worldwide |
Parent organization | Microsoft |
The Microsoft Digital Crimes Unit (DCU) is a Microsoft sponsored team of international legal and internet security experts employing the latest tools and technologies to stop or interfere with cyber crime and cyber threats.[1]
Contents
1 Areas of emphasis
2 Actions against the ZeroAccess botnet
3 See also
4 References
5 External links
Areas of emphasis[edit]
There are three areas on which the DCU concentrates:[1]
Child protection, combating child sexual abuse facilitated through information technology
Copyright infringement and other intellectual property infringements
Malware crimes, particularly botnets, internet bots used for malicious purposes
Actions against the ZeroAccess botnet[edit]
On December 5, 2013, the Microsoft Digital Crimes Unit, the FBI, Europol, and other industry partners attempted to disrupt the ZeroAccess botnet.[2] Although the efforts took down 18 hosts that were part of the ZeroAccess command and control network, because of the peer-to-peer nature of the botnet, ZeroAccess remains active.[3]
See also[edit]
- Attack (computing)
- Child protective services
- Computer worm
- Distributed Denial of Service
References[edit]
^ ab "Microsoft Digital Crimes Unit". Microsoft in Public Safety & National Security. Redmond, WA: Microsoft. Retrieved 2013-11-15. External link in|website=
(help)
^ Stewart, Christopher S.; Marr, Merissa (2013-12-05). "Microsoft Takes Action Against Alleged Ad-Fraud 'Botnet' ZeroAccess". online.wsj.com. New York, NY: The Wall Street Journal). Retrieved 2013-12-07.
^ Gallagher, Sean (2013-12-06). "Microsoft disrupts botnet that generated $2.7M per month for operators; Update: researchers say not all C&C servers seized, and P2P makes takedown moot". arstechnica.com. New York, NY: Condé Nast. Retrieved 2013-12-07.
External links[edit]
- Exploitation Crimes
- IP Crimes
- Malicious Software Crimes
Microsoft DCU on Facebook
This computer security article is a stub. You can help Wikipedia by expanding it. |
This article related to Microsoft is a stub. You can help Wikipedia by expanding it. |
Categories:
- Computer security organizations
- Microsoft divisions
- Computer security stubs
- Microsoft stubs
(window.RLQ=window.RLQ||).push(function()mw.config.set("wgPageParseReport":"limitreport":"cputime":"0.228","walltime":"0.306","ppvisitednodes":"value":1362,"limit":1000000,"ppgeneratednodes":"value":0,"limit":1500000,"postexpandincludesize":"value":54364,"limit":2097152,"templateargumentsize":"value":1674,"limit":2097152,"expansiondepth":"value":10,"limit":40,"expensivefunctioncount":"value":0,"limit":500,"unstrip-depth":"value":0,"limit":20,"unstrip-size":"value":4701,"limit":5000000,"entityaccesscount":"value":1,"limit":400,"timingprofile":["100.00% 231.069 1 -total"," 56.36% 130.223 1 Template:Infobox_organization"," 50.07% 115.703 1 Template:Infobox"," 21.22% 49.025 1 Template:Reflist"," 17.47% 40.361 3 Template:Cite_web"," 17.21% 39.760 1 Template:Coord"," 9.12% 21.069 1 Template:Microsoft"," 8.83% 20.394 2 Template:Navbox"," 6.55% 15.127 2 Template:Unbulleted_list"," 6.03% 13.930 1 Template:Computer-security-stub"],"scribunto":"limitreport-timeusage":"value":"0.089","limit":"10.000","limitreport-memusage":"value":3607426,"limit":52428800,"cachereport":"origin":"mw1247","timestamp":"20180823195749","ttl":1900800,"transientcontent":false);mw.config.set("wgBackendResponseTime":82,"wgHostname":"mw1244"););