Defend Against Botnets with IP Scanning
According to a recent ThreatPost article, during a two-week time span earlier this year, thousands of poorly protected computers were compromised by a botnet that came from a singular malicious website. The botnet targeted weak remote desktop protocol (RDP) connections and brute forced them open, which allowed cyber-attackers to easily access user credentials and extract payment card information.
While it is not clear how the malware is being spread, according to researchers from FireEye, it appears to have circulated from one particular site - destre45[dot]com. In conjunction with weak password settings, users could leave themselves incredibly vulnerable to botnet attacks by unknowingly visiting a malicious website without taking the necessary precautions.
We decided to investigate this threat further and scanned the questionable website, utilizing our new IP reputation scanning feature that was recently launched into beta via our Metascan Online site. The result was that 3 of the 15 available reputation sources reported the website containing some form of malware. This capability allows users to take advantage of an aggregated IP reputation analysis and scan unfamiliar IP addresses or websites beforehand, ensuring that the website they plan to visit is not putting their personal information in jeopardy.
Malicious sites such as highlighted in this blog reinforce that users must take additional steps to ensure they are not connecting to malicious websites and become victims of cyber-attacks. While avoiding unfamiliar IP addresses or websites is the best course of action, if a user must connect to an unknown IP address they should add IP reputation scanning as an extra layer of security against potential botnet attacks.
As we mentioned, the all-new IP scanning feature for Metascan Online is currently in beta and we would love to get feedback from our amazing community! Tweet us @OPSWAT to let us know your thoughts about this new feature or ways we can improve it before we push the new feature to GA.

- Academy 11
- Advanced Threat Prevention 55
- CEO's Blog 20
- Company Announcements 33
- Cross-Domain Solutions 2
- CTO's Blog 23
- CVEs 189
- Deep CDR 40
- Email Security 1
- Email Threat Prevention 21
- File Upload Security 3
- Kiosk & USB Security 31
- Malware Analysis 1
- OACCP Certification 29
- OESIS Framework 12
- Product Announcements 173
- Reports 28
- Secure Access 23
- Secure Data Storage 5
- Technology Partnerships 37
- Vulnerabilities 21
- File Upload Protection – 10 Best Practices for Preventing Cyber Attacks
- OPSWAT Released a New Advanced Email Security Comparison Guide
- Infographic: File Upload Security – A Mission Against Malware
- Can You Spot the Social Engineering Techniques in a Phishing Email?
- Vulnerabilities: CVEs, Hashes, Application Installers Report January 22-29, 2018
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure
- Police Handing Out Malware-Infected USBs Is Not an Isolated Incident
- 10 Things to Include in Your Employee Cyber Security Policy
- 11 of the Largest Data Breaches of All Time (Updated)