Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft Thwarts Major Hacking Attempt

Microsoft Thwarts Major Hacking Attempt

With the 2020 U.S. Election under a month away, there has been a lot of concern that outside interests would try to influence the results. Microsoft has recently disrupted a huge coordinated hacking effort that had designs of altering the election infrastructure needed for a fair and secure election. Let’s take a look at the effort and Microsoft’s response in today’s blog.

The Skinny

Microsoft and The United States Cyber Command (USCYBERCOM) announced early on October 12, 2020 that they took down the servers that fueled an enormous botnet called TrickBot, but walked it back when it was evident that the botnet was resilient enough to stay up even as their central servers were taken down. Industry professionals described the action as “kneecapping” the botnet rather than “cutting off its head”. Most predict TrickBot to make a comeback. 

TrickBot has an estimated one million devices that have been hijacked and infected with the botnet’s malicious code. Based out of Russia, it is believed that the TrickBot botnet was intent on deploying strategic ransomware attacks to disrupt the 2020 U.S. Presidential election.

Taking Down TrickBot

After the events of the 2016 U.S. Presidential election, most cybersecurity professionals were on the lookout for cybercriminal organizations looking to influence or interrupt the legitimacy of the election. For their part, Microsoft had already warned election officials that several Russian, Iranian, and Chinese hacking collectives are targeting not only the candidates, but also the election infrastructure itself. 

To disrupt the TrickBot’s operational command, Microsoft, USCYBERCOM, and National Security Agency operators were able to send a command to all zombies in the botnet to disconnect themselves after which they were able to flood the TrickBot’s database with millions of false records. 

While it is reported that the TrickBot remains active, the unprecedented effort actually set a legal precedent. Microsoft’s legal team successfully argued that TrickBot abused Windows code for malicious purposes, which stands in breach of the Windows software development kit’s terms of service. By successfully arguing that TrickBot was infringing on their copyright, Microsoft got legal clearance to take down the Malware as a Service.

With a legal precedent, now Microsoft, or any other software company can work to mitigate more malware attacks using their software. 

Do you think that the election is in danger because of foreign hackers? What should be done about it? Leave your thoughts in the comment section below.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 23 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication AI Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Training Compliance Gadgets Cloud Computing Covid-19 Server Managed Service Provider Outsourced IT Remote Work IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Two-factor Authentication Mobile Office Managed Services Data Security Apps Vendor Tip of the week Voice over Internet Protocol Mobile Device Management Chrome Gmail Networking Budget WiFi Apple App BYOD Employer-Employee Relationship Computing Access Control Hacker Information Technology Avoiding Downtime Marketing Conferencing Office 365 Managed IT Services How To BDR HIPAA Physical Security Applications Operating System Computers Health Risk Management Help Desk Website Retail Analytics Office Tips 2FA Healthcare Augmented Reality Storage Password Bring Your Own Device Big Data Router Virtual Private Network Printer Customer Service Cybercrime Paperless Office Infrastructure Monitoring Document Management Windows 11 Managed IT Service Remote Workers Telephone Firewall Scam Excel Data loss Cooperation Free Resource Project Management Windows 7 The Internet of Things Patch Management Save Money Microsoft 365 Social Remote Monitoring End of Support Vulnerability Vendor Management Solutions Going Green Display Processor Content Filtering Computer Repair Mobile Security Hacking Holidays Presentation YouTube Cryptocurrency Data Storage Smart Technology Wireless Technology Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Virtual Desktop Saving Time LiFi Data storage Word Maintenance Outlook Downloads Supply Chain Antivirus iPhone Money Licensing Humor Entertainment Vulnerabilities Safety Sports Images 101 Mouse Multi-Factor Authentication Robot Mobility Telephone System Cost Management Administration Data Privacy IT Management Meetings VPN Employees Integration Customer Relationship Management Settings Modem Printing User Tip Wireless Database Surveillance Virtual Assistant Hosted Solution Vendors Typing Be Proactive Network Management Tech Support IT Technicians Virtual Machine Cookies Monitors Cyber Monday Medical IT Workforce Proxy Server Reviews Threats Knowledge Tactics Development Hotspot Transportation Google Drive User Workplace Strategies Websites Mirgation Hypervisor Nanotechnology Optimization PowerPoint Meta Shopping 5G Amazon SharePoint Experience Addiction Electronic Medical Records Language Employer/Employee Relationships IP Address Google Docs Unified Communications Navigation Bitcoin Running Cable Management PCI DSS Chatbots Screen Reader Writing Distributed Denial of Service Google Wallet Outsource IT Lenovo Gig Economy Recovery Environment Media Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Evernote Hard Drives Windows 8 Laptop Server Management Regulations Compliance Private Cloud Identity Identity Theft Smart Tech Memes Domains Drones Small Businesses Superfish Bookmark Displays Download Net Neutrality Twitter Alerts SQL Server Refrigeration Halloween Financial Data Error History Connectivity IT Social Engineering Break Fix Public Speaking Outsourcing Browsers Smartwatch Upload Procurement Remote Computing Azure Lithium-ion battery Multi-Factor Security Tech Hacks Entrepreneur Scary Stories Workplace Social Network Telework Cyber security CES Fun Tablet IoT Communitications Dark Web Hiring/Firing Deep Learning Paperless Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Undo Co-managed IT Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment How To Microsoft Excel Education Technology Care Business Communications Gamification Flexibility Notifications Staff Value Travel Social Networking Legislation Mobile Computing Scams Organization Techology Fileless Malware Digital Security Cameras Search Google Maps Smart Devices Hybrid Work Application Best Practice Human Resources Content Remote Working Wearable Technology Memory Unified Threat Management Motherboard Data Breach Comparison Google Play Buisness Cables Health IT Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions IBM Legal IT solutions Business Growth Google Apps Wasting Time Trend Micro Network Congestion Specifications Security Cameras IT Maintenance User Error Microchip Cortana Internet Exlporer Software as a Service Fraud Business Intelligence Alt Codes Shortcuts Username Managing Costs Point of Sale eCommerce Black Friday SSID Competition Downtime Ransmoware

Blog Archive