SHARE
Facebook X Pinterest WhatsApp

Mitigation Strategies for Coreflood Trojan Botnets

Mitigation Strategies for Coreflood Trojan Botnets Use US-CERT tactical and strategic recommendations to prevent Coreflood Trojan malware infection. Software vulnerabilities are not always a necessity for malicious software (malware) infection and propagation. The Coreflood Trojan is an example of this type of vulnerability-independent malware. It is designed to leverage the natural structure of a Windows […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Feb 16, 2012

Mitigation Strategies for Coreflood Trojan Botnets

Use US-CERT tactical and strategic recommendations to prevent Coreflood Trojan malware infection.


Software vulnerabilities are not always a necessity for malicious software (malware) infection and propagation. The Coreflood Trojan is an example of this type of vulnerability-independent malware. It is designed to leverage the natural structure of a Windows network for account compromise and data theft.

Criminals typically utilize infected websites to stealthily infect users. Once the system is infected, the malware remains dormant on the system until someone with a privileged account (system administrator) logs in. Once the system administrator logs into the computer, the malware attempts to traverse the network using a legitimate Windows program, psexec. Later versions of the malware stopped using the psexec tool and implemented a custom tool designed to imitate psexec capabilities. Coreflood was originally discovered in 2001 and continues to evolve as an active threat within the malware market.

US-CERT recommends organizations evaluate the following tactical and strategic mitigations to determine which mitigations they can leverage in their specific environments to minimize and prevent Coreflood Trojan infections.

Included in this ZIP file are:

  • Intro Page.doc
  • Terms and Conditions.pdf
  • Coreflood Trojan Botnet.pdf

Recommended for you...

Is 5G Enough to Boost the Metaverse?
Litton Power
Apr 18, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
Best Enterprise 5G Network Providers 2022
5G Cybersecurity Risks and How to Address Them
Kihara Kimachia
Dec 17, 2021
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.