A family of malware worms that typically spreads through instant messaging, USB removable drives, websites or social media channels like Facebook and Twitter. Downloading and installing Dorkbot malware results in it opening a backdoor on infected computers, allowing for remote access and potentially turning the computer into a botnet.
The Dorkbot worm gained publicity in late 2011 for an attack on Facebook’s chat system, with users receiving a message with a bogus link that appeared to come from one of their Facebook friends. A similar Dorkbot worm appeared later in the same year, this time preying on Twitter users.
A new strain of Dorkbot targeting Skype users appeared in October 2012, with the Skype worm also installing ransomware in this case. The ransomware would threaten to lock a user out of being able to use their computer and demand a payment of several hundreds of dollars be made within a limited timeframe or have files on the computer deleted.
Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.
From cute electronic toys to VR gaming, here are 5 hot gifts to give to your special tech enthusiast this holiday season. Read More »What's Hot in Tech: AI Tops the List
Like everything in technology, AI touches on so many other trends, like self-driving cars and automation, and Big Data and the Internet of Things... Read More »DevOp's Role in Application Security
As organizations rush to release new applications, security appears to be getting short shrift. DevSecOps is a new approach that holds promise. Read More »
Java is a high-level programming language. This guide describes the basics of Java, providing an overview of syntax, variables, data types and... Read More »Java Basics, Part 2
This second Study Guide describes the basics of Java, providing an overview of operators, modifiers and control Structures. Read More »The 7 Layers of the OSI Model
The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More »