Webopedia on Google+Webopedia on TwitterWebopedia on FacebookTech Bytes Blog
Main » TERM » M »

Mariposa

The name of a malicious botnet. Dubbed Mariposa, this widespread malware campaign managed to infiltrate more than 13 million PCs and more than half of the world's 1,000-largest companies.

Three men, who called themselves the "Nightmare Days Team" and dubbed their botnet projects "Mariposa," were arrested by Spanish authorities in February 2010 after a yearlong investigation by law enforcement agencies and security software vendors Panda Security.

The Mariposa �� the Spanish word for butterfly �� botnet was shut down on Dec. 23, 2009 after operating largely unhindered for almost a year. Mariposa accessed more than 13 million PCs in all, making it one of the largest and most destructive botnets in history.

Adapted from "Crackdown on Mariposa: Botnet Infected 13 Million PCs" on eSecurity Planet.






TECH RESOURCES FROM OUR PARTNERS
LATEST ARTICLES
Slideshow: History of Microsoft Operating Systems

Microsoft Windows is a family of operating systems for personal computers. In this article we look at the history of Microsoft operating... Read More »

Slideshow: Interesting Facts About Google Search

From Goats to Penguins, a server outage and trillions of searches, our slideshow presents interesting facts about Google and the Google.com... Read More »

Slideshow: 5 Apps to Make Your Commute a Breeze

We've scoured the App and Play Stores to bring you five of the most useful apps to have with you on the road, plus a bonus in-car feature. Read More »

STUDY GUIDES
Java Basics, Part 1

Java is a high-level programming language. This guide describes the basics of Java, providing an overview of syntax, variables, data types and... Read More »

Java Basics, Part 2

This second Study Guide describes the basics of Java, providing an overview of operators, modifiers and control Structures. Read More »

The 7 Layers of the OSI Model

The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More »