Microsoft Digital Crimes Unit

From Infogalactic: the planetary knowledge core
Jump to: navigation, search
Microsoft Digital Crimes Unit
Abbreviation DCU
Purpose An international legal and technical team of attorneys, investigators, and forensic analysts, with expertise across the areas of malware, botnets, IP crimes, and technology-facilitated child exploitation
Headquarters Microsoft Redmond Campus
Location
Coordinates Lua error in Module:Coordinates at line 668: callParserFunction: function "#coordinates" was not found.
Region served
Worldwide
Parent organization
Microsoft
Website www.microsoft.com/government/ww/safety-defense/initiatives/pages/digital-crimes-unit.aspx

The Microsoft Digital Crimes Unit (DCU) is a Microsoft sponsored team of international legal and internet security experts employing the latest tools and technologies to stop or interfere with cyber crime and cyber threats.[1]

Areas of emphasis

There are three areas on which the DCU concentrates:[1]

Actions against the ZeroAccess botnet

On December 5, 2013, the Microsoft Digital Crimes Unit, the FBI, Europol, and other industry partners attempted to disrupt the ZeroAccess botnet.[2] However, although the efforts took down 18 hosts that were part of the ZeroAccess command and control network, because of the peer-to-peer nature of the botnet, ZeroAccess continues to remain active.[3]

See also

References

  1. 1.0 1.1 "Microsoft Digital Crimes Unit". Microsoft in Public Safety & National Security. Redmond, WA: Microsoft. Retrieved 2013-11-15. External link in |website= (help)<templatestyles src="Module:Citation/CS1/styles.css"></templatestyles>
  2. Stewart, Christopher S.; Marr, Merissa (2013-12-05). "Microsoft Takes Action Against Alleged Ad-Fraud 'Botnet' ZeroAccess". online.wsj.com. New York, NY: The Wall Street Journal). Retrieved 2013-12-07.<templatestyles src="Module:Citation/CS1/styles.css"></templatestyles>
  3. Gallagher, Sean (2013-12-06). "Microsoft disrupts botnet that generated $2.7M per month for operators; Update: researchers say not all C&C servers seized, and P2P makes takedown moot". arstechnica.com. New York, NY: Condé Nast. Retrieved 2013-12-07.<templatestyles src="Module:Citation/CS1/styles.css"></templatestyles>

External links