Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft Thwarts Major Hacking Attempt

Microsoft Thwarts Major Hacking Attempt

With the 2020 U.S. Election under a month away, there has been a lot of concern that outside interests would try to influence the results. Microsoft has recently disrupted a huge coordinated hacking effort that had designs of altering the election infrastructure needed for a fair and secure election. Let’s take a look at the effort and Microsoft’s response in today’s blog.

The Skinny

Microsoft and The United States Cyber Command (USCYBERCOM) announced early on October 12, 2020 that they took down the servers that fueled an enormous botnet called TrickBot, but walked it back when it was evident that the botnet was resilient enough to stay up even as their central servers were taken down. Industry professionals described the action as “kneecapping” the botnet rather than “cutting off its head”. Most predict TrickBot to make a comeback. 

TrickBot has an estimated one million devices that have been hijacked and infected with the botnet’s malicious code. Based out of Russia, it is believed that the TrickBot botnet was intent on deploying strategic ransomware attacks to disrupt the 2020 U.S. Presidential election.

Taking Down TrickBot

After the events of the 2016 U.S. Presidential election, most cybersecurity professionals were on the lookout for cybercriminal organizations looking to influence or interrupt the legitimacy of the election. For their part, Microsoft had already warned election officials that several Russian, Iranian, and Chinese hacking collectives are targeting not only the candidates, but also the election infrastructure itself. 

To disrupt the TrickBot’s operational command, Microsoft, USCYBERCOM, and National Security Agency operators were able to send a command to all zombies in the botnet to disconnect themselves after which they were able to flood the TrickBot’s database with millions of false records. 

While it is reported that the TrickBot remains active, the unprecedented effort actually set a legal precedent. Microsoft’s legal team successfully argued that TrickBot abused Windows code for malicious purposes, which stands in breach of the Windows software development kit’s terms of service. By successfully arguing that TrickBot was infringing on their copyright, Microsoft got legal clearance to take down the Malware as a Service.

With a legal precedent, now Microsoft, or any other software company can work to mitigate more malware attacks using their software. 

Do you think that the election is in danger because of foreign hackers? What should be done about it? Leave your thoughts in the comment section below.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 03 October 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Saving Money Communication Cybersecurity Data Backup Smartphone Managed Service Android Productivity Upgrade VoIP Business Management Smartphones Mobile Devices communications Disaster Recovery Data Recovery Windows Browser Social Media Microsoft Office Managed IT Services AI Current Events Network Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Information Covid-19 Holiday Server Managed Service Provider Remote Work Training Outsourced IT Compliance Encryption Spam Employee/Employer Relationship Office Windows 10 IT Support Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Tip of the week Chrome Managed Services Mobile Device Management Budget Voice over Internet Protocol Gmail Apple Networking App Employer-Employee Relationship BYOD Access Control Avoiding Downtime Office 365 Marketing Conferencing How To WiFi BDR HIPAA Computing Applications Information Technology Hacker Health 2FA Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Managed IT Services Big Data Operating System Router Virtual Private Network Risk Management Computers Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Remote Workers Firewall Telephone Scam Data loss The Internet of Things Free Resource Cooperation Project Management Windows 7 Going Green Patch Management Social Microsoft 365 Save Money Remote Monitoring Vulnerability End of Support Solutions Vendor Management Cybercrime Physical Security Customer Service Display Printer Holidays Virtual Desktop Data storage LiFi Wireless Technology Data Storage Supply Chain Smart Technology Outlook Video Conferencing Managed Services Provider Machine Learning Saving Time Money Virtual Machines Professional Services Humor Word Managed IT Service Maintenance Sports Downloads Antivirus Mouse iPhone Licensing Safety Entertainment Administration Vulnerabilities Data Privacy Images 101 Telephone System Multi-Factor Authentication Mobility Robot Cost Management Settings Printing Wireless Content Filtering IT Management Customer Relationship Management Employees VPN YouTube Meetings Integration Cryptocurrency User Tip Modem Hacking Processor Presentation Computer Repair Mobile Security Proxy Server Reviews Google Wallet Cookies Medical IT Monitors Cyber Monday Tactics Development Transportation Small Businesses Hotspot Mirgation Hypervisor Displays Laptop Websites Windows 8 IP Address Shopping Drones Nanotechnology Optimization PowerPoint SharePoint Addiction Employer/Employee Relationships Outsourcing Electronic Medical Records Language Chatbots Halloween Recovery Navigation Management PCI DSS Gig Economy Lenovo Screen Reader Hard Drives Workplace Writing Distributed Denial of Service Service Level Agreement Internet Service Provider Domains Teamwork Hiring/Firing Virtual Reality Computing Infrastructure Identity Scary Stories Private Cloud Evernote Paperless Regulations Compliance Hacks Server Management Bookmark Superfish Smart Tech Memes Identity Theft Refrigeration Co-managed IT Fun Download Net Neutrality Deep Learning Public Speaking SQL Server Technology Care Twitter Alerts Lithium-ion battery History Error Business Communications Financial Data Browsers Smartwatch Connectivity IT Education Scams Social Engineering Break Fix Entrepreneur Upload Procurement Azure Hybrid Work Remote Computing Cyber security Tech Human Resources Multi-Factor Security Social Network Telework Mobile Computing CES IoT Communitications Tablet Undo Cables Search Dark Web Trends Supply Chain Management Best Practice Alert Regulations Buisness File Sharing Term Google Apps Dark Data Google Calendar Customer Resource management FinTech Managed IT Data Analysis Legal Star Wars IT Assessment IT solutions IT Maintenance How To Microsoft Excel Gamification Flexibility Business Growth Value Business Intelligence Notifications Staff Organization Social Networking Travel Application Shortcuts Legislation Fileless Malware Digital Security Cameras Techology Smart Devices Google Maps Ransmoware Cortana Wearable Technology Memory Vendors Content Remote Working Alt Codes IBM Health IT Motherboard Data Breach Downtime Unified Threat Management Google Play Be Proactive Comparison Directions Videos Unified Threat Management Assessment Electronic Health Records Hosted Solution Workforce Permissions Wasting Time Threats Typing Trend Micro Security Cameras Workplace Strategies Network Congestion Specifications Microchip Google Drive User Error Internet Exlporer Software as a Service Competition Meta Knowledge Fraud Managing Costs Amazon Username eCommerce Point of Sale SSID 5G Black Friday Google Docs Database Surveillance Unified Communications Virtual Assistant Outsource IT Experience IT Technicians Virtual Machine Environment Running Cable Tech Support User Media Bitcoin Network Management

Blog Archive