Long-time Slashdot reader UnderAttack writes: In September last year, German police raided what was known as “Cyberbunker 2.0”, a former cold war nuclear bunker turned into a “bulletproof” hosting facility. A student of the internet security-training company SANS Technology Institute analyzed traffic reaching out for the former Cyberbunker’s IP address space. Over two weeks, thousands of bots called “home” still looking for a command and control server. They also observed a number of phishing sites, as well as an odd ad network still directing users to the Cyberbunker’s IPs. You can find the summary here.
of this story at Slashdot.
Source:: Slashdot