Simda, as the botnet was known, infected an additional 128,000 new 
computers each month over the past half year, a testament to the stealth
 of the underlying backdoor trojan and the organization of its creators.
 The backdoor morphed into a new, undetectable form every few hours, 
allowing it to stay one step ahead of many antivirus programs. Botnet 
operators used a variety of methods to infect targets, including 
exploiting known vulnerabilities in software such as Oracle Java, Adobe Flash, and Microsoft Silverlight.
 The exploits were stitched into websites by exploiting SQL injection 
vulnerabilities and exploit kits such as Blackhole and Styx. Other 
methods included sending spam and other forms of social engineering. 
Countries most affected by Simda included the US, with 22 percent of the
 infections, followed by the UK, Turkey with five percent, and Canada 
and Russia with four percent.
The malware modified the HOSTS file Microsoft Windows machines use to
 map specific domain names to specific IP addresses. As a result, 
infected computers that attempted to visit addresses such as 
connect.facebook.net or google-analytics.com were surreptitiously 
diverted to servers under the control of the attackers. Often the 
booby-trapped HOSTS file remains even after the Simda backdoor has been 
removed. Security researchers advised anyone who may have been infected 
to inspect their HOSTS file, which is typically located in the directory
 %SYSTEM32%\drivers\etc\hosts. People who want to discover if they have 
been infected by Simda can check this page
 provided by AV provider Kaspersky Lab.
The page is effective as long as
 a person's IP address hasn't changed from when the infection was 
detected.
The takedown involved the seizing of 
14 command-and-control servers that were located n the Netherlands, US, 
Luxembourg, Poland, and Russia. The highly coordinated takedown occurred
 simultaneously all over the world last Thursday and Friday and was 
organized by the Interpol Global Complex for Innovation in Singapore.
It
 included officers from the Dutch National High Tech Crime Unit, the US 
FBI, the Police Grand-Ducale Section Nouvelles Technologies in 
Luxembourg, and the Russian Ministry of the Interior’s Cybercrime 
Department “K." INTERPOL also worked with Microsoft, Kaspersky Lab, 
Trend Micro, and Japan’s Cyber Defense Institute for technical 
assistance.
Last week's takedown is only the latest international operation to 
shut down a botnet that indiscriminately menaced huge numbers of people 
around the world. Last week a separate takedown targeted Beebone,
 a highly elusive botnet that provided a captive audience of backdoored 
PCs to criminals who were looking for an easy way to quickly install 
malware on large numbers of computers. Get Latest Setup and Botnet configuration contact me on skype nitro_9ice or Ymessenger- nitro_ice9 for more insight.