{"id":37627,"date":"2020-10-12T18:31:25","date_gmt":"2020-10-12T18:31:25","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31658\/Microsoft-Takes-Down-Hacking-Network-With-Potential-To-Disrupt-Election.html"},"modified":"2020-10-12T18:31:25","modified_gmt":"2020-10-12T18:31:25","slug":"microsoft-takes-down-hacking-network-with-potential-to-disrupt-election","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\/","title":{"rendered":"Microsoft Takes Down Hacking Network With Potential To Disrupt Election"},"content":{"rendered":"<figure class=\"image image-large pull-none hasCaption shortcode\" section=\"shortcodeImage\"><span class=\"imageContainer\"><span><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cnet3.cbsistatic.com\/img\/kqDqn8SphPUye6XWMl5IjXIJLWc=\/1092x0\/2020\/06\/20\/0a1723b0-5f50-4104-9bd0-87ef0f617c2d\/microsoft-logo-phone-american-flag-3079.jpg\" class alt=\"microsoft-logo-phone-american-flag-3079\" height=\"0\" width=\"1092\"><\/span><\/span><figcaption readability=\"1\"><span class=\"caption\" readability=\"2\"><\/p>\n<p>Microsoft obtained a court order to disrupt the largest botnet in the world.<\/p>\n<p><\/span><span class=\"credit\"> Angela Lang\/CNET <\/span><\/figcaption><\/figure>\n<p> <a class=\"c-packageUnit\" href=\"https:\/\/www.cnet.com\/elections-2020\/\" section=\"package-cta|elections\" data-ad-ready=\"null\">This story is part of <span class=\"c-packageUnit_link\">Elections 2020<\/span>, CNET&#8217;s coverage of the run-up to voting in November. <\/a><\/p>\n<p class=\"speakableTextP1\">A group of tech companies dismantled a powerful hacking tool used by Russian attackers just three weeks before the US presidential election. On Monday, <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2020\/10\/12\/trickbot-ransomware-cyberthreat-us-elections\/\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">Microsoft announced<\/a> actions against Trickbot, a Russian botnet that&#8217;s infected more than a million computers since 2016 and that&#8217;s behind scores of ransomware attacks.&nbsp;<\/p>\n<p class=\"speakableTextP2\">Cybersecurity experts have raised concerns about ransomware attacks casting doubt on election results. While a ransomware attack wouldn&#8217;t change votes and could only lock up machines, the chaos stirred by a cyberattack could create uncertainty about the outcome of the results.&nbsp;<\/p>\n<p>Election officials in most states have <a href=\"https:\/\/www.cnet.com\/news\/how-to-commit-mail-in-voting-fraud-its-nearly-impossible\/\">offline backup measures<\/a> in the event of a ransomware attack, but have a harder time tackling the disinformation that comes with getting hacked. Ransomware attacks are also a <a href=\"https:\/\/www.cnet.com\/news\/election-security-in-2020-means-a-focus-on-county-officials-dhs\/\">concern for counties<\/a> because they don&#8217;t have many cybersecurity resources.<\/p>\n<div class=\"newsletter-subscribe-form desktop -inline \" section=\"subscribeNewsletter\" data-track=\"newsletter\" readability=\"6\">\n<div class=\"newsletterTitle \">\n<p><h2>CNET Daily News <\/h2>\n<\/p><\/div>\n<div class=\"newsletter\" readability=\"7\">\n<p class=\"description\">Stay in the know. Get the latest tech stories from CNET News every weekday.<\/p>\n<\/p><\/div>\n<\/div>\n<p>Ransomware attacks <a href=\"https:\/\/www.cnet.com\/news\/ransomware-devastated-cities-in-2019-officials-hope-to-stop-a-repeat-in-2020\/\">have steadily increased<\/a> over the four years since Trickbot came online, and they&#8217;ve targeted municipal institutions like schools, courts and hospitals. Trickbot, the world&#8217;s largest botnet, is believed to be behind last month&#8217;s <a href=\"https:\/\/techcrunch.com\/2020\/09\/28\/universal-health-services-ransomware\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" data-component=\"externalLink\">ransomware attack on Universal Health Services,<\/a> which locked up computers in hundreds of hospitals in the US.<\/p>\n<p>Trickbot hasn&#8217;t affected any election infrastructure yet, and US officials have noted that there haven&#8217;t been <a href=\"https:\/\/www.cnet.com\/news\/election-security-officials-find-no-evidence-of-coordinated-fraud-with-mail-in-ballots\/\">significant cyberattacks against the US election<\/a>, but the takedown announced Monday closes off a powerful tool that Russian hackers could&#8217;ve used to interfere with the election.&nbsp;<\/p>\n<p><svg class=\"svg-symbol playerControls\"><symbol id=\"play\" viewBox=\"0 0 26.6 32\"><path d=\"M0,2.6c0-2.4,1.6-3.3,3.7-2L25,13.7c2,1.3,2,3.2,0,4.5L3.7,31.4c-2,1.3-3.7,0.3-3.7-2C0,29.4,0,2.6,0,2.6z\" \/><\/symbol><symbol id=\"pause\" viewBox=\"0 0 26.6 32\"><g><polygon points=\"16,32 26.5,32 26.5,8.8 26.5,0 16,0\" \/><rect x=\"0.1\" y=\"0\" width=\"10.6\" height=\"32\" \/><\/g><\/symbol><symbol id=\"playlist\" viewBox=\"0 0 32 22.9\"><g><circle class=\"st11\" cx=\"2.3\" cy=\"20.6\" r=\"2.3\" \/><circle class=\"st11\" cx=\"2.3\" cy=\"11.4\" r=\"2.3\" \/><circle class=\"st11\" cx=\"2.3\" cy=\"2.3\" r=\"2.3\" \/><path class=\"st11\" d=\"M32,1.1C32,0.5,31.5,0,30.9,0H10.3C9.7,0,9.1,0.5,9.1,1.1v2.3c0,0.6,0.5,1.1,1.1,1.1h20.6c0.6,0,1.1-0.5,1.1-1.1V1.1z\" \/><path class=\"st11\" d=\"M32,10.3c0-0.6-0.5-1.1-1.1-1.1H10.3c-0.6,0-1.1,0.5-1.1,1.1v2.3c0,0.6,0.5,1.1,1.1,1.1h20.6c0.6,0,1.1-0.5,1.1-1.1V10.3z\" \/><path class=\"st11\" d=\"M32,19.4c0-0.6-0.5-1.1-1.1-1.1H10.3c-0.6,0-1.1,0.5-1.1,1.1v2.3c0,0.6,0.5,1.1,1.1,1.1h20.6c0.6,0,1.1-0.5,1.1-1.1V19.4z\" \/><\/g><\/symbol><symbol id=\"speaker-on\" viewBox=\"0 0 32 28.1\"><g><g><path d=\"M12.6,5L6.3,8.7H0.6C0.3,8.7,0,9,0,9.3V19c0,0.4,0.3,0.7,0.6,0.7h5.9l6.1,3.4c1.3,0.8,1.5,0.2,1.5-1.5V6.5C14.2,4.8,13.9,4.2,12.6,5z\" \/><\/g><path d=\"M18,23.1v-2.8c2.6,0,4.7-2.8,4.7-6.2S20.6,7.8,18,7.8V5c4.2,0,7.5,4,7.5,9S22.1,23.1,18,23.1z\" \/><path d=\"M21.3,28.1v-2.8c4.4,0,7.9-5,7.9-11.2S25.6,2.8,21.3,2.8V0C27.2,0,32,6.3,32,14C32,21.8,27.2,28.1,21.3,28.1z\" \/><\/g><\/symbol><symbol id=\"speaker-off\" viewBox=\"0 0 32 18.8\"><g><g><path d=\"M12.6,0.4L6.3,4H0.6C0.3,4,0,4.3,0,4.7v9.7c0,0.4,0.3,0.7,0.6,0.7h5.9l6.1,3.4c1.3,0.8,1.5,0.2,1.5-1.5V1.8C14.2,0.2,13.9-0.5,12.6,0.4z\" \/><\/g><polygon points=\"32,4.5 30.2,2.7 25.3,7.6 20.4,2.7 18.6,4.5 23.5,9.4 18.6,14.3 20.4,16.1 25.3,11.2 30.2,16.1 32,14.3 27.1,9.4 \" \/><\/g><\/symbol><symbol id=\"captions\" viewBox=\"0 0 32 16.2\"><g><path d=\"M8.6,16.2c-1.2,0-2.4-0.2-3.4-0.6c-1.1-0.4-2-0.9-2.7-1.6c-0.8-0.7-1.4-1.6-1.8-2.6C0.2,10.4,0,9.3,0,8.1c0-1.2,0.2-2.3,0.7-3.3s1-1.8,1.8-2.6C3.2,1.5,4.1,1,5.2,0.6S7.4,0,8.6,0c1,0,1.9,0.1,2.7,0.4c0.8,0.3,1.4,0.6,2,1.1c0.6,0.4,1.1,0.9,1.4,1.5c0.4,0.5,0.7,1.1,0.9,1.6l-4.1,1.9c-0.1-0.3-0.2-0.6-0.4-0.9C11,5.3,10.8,5,10.5,4.8c-0.3-0.2-0.6-0.4-0.9-0.5c-0.3-0.1-0.7-0.2-1-0.2C8,4.2,7.5,4.3,7,4.5C6.6,4.7,6.2,5,5.8,5.3C5.5,5.7,5.2,6.1,5.1,6.5C4.9,7,4.8,7.5,4.8,8.1c0,0.5,0.1,1.1,0.3,1.5c0.2,0.5,0.4,0.9,0.8,1.2c0.3,0.4,0.7,0.6,1.2,0.8C7.5,11.9,8,12,8.6,12c0.3,0,0.7-0.1,1-0.2c0.3-0.1,0.6-0.3,0.9-0.5c0.3-0.2,0.5-0.4,0.7-0.7c0.2-0.3,0.3-0.6,0.4-0.9l4.1,1.9c-0.2,0.5-0.5,1-0.9,1.6c-0.4,0.5-0.9,1-1.4,1.5c-0.6,0.4-1.2,0.8-2,1.1C10.5,16,9.6,16.2,8.6,16.2z\" \/><path d=\"M24.9,16.2c-1.2,0-2.4-0.2-3.4-0.6c-1.1-0.4-2-0.9-2.7-1.6c-0.8-0.7-1.4-1.6-1.8-2.6c-0.4-1-0.7-2.1-0.7-3.3c0-1.2,0.2-2.3,0.7-3.3c0.4-1,1-1.8,1.8-2.6c0.8-0.7,1.7-1.3,2.7-1.7C22.6,0.2,23.7,0,24.9,0c1,0,1.9,0.1,2.7,0.4c0.8,0.3,1.4,0.6,2,1.1c0.6,0.4,1.1,0.9,1.4,1.5C31.5,3.5,31.8,4,32,4.5l-4.1,1.9c-0.1-0.3-0.2-0.6-0.4-0.9c-0.2-0.3-0.4-0.5-0.7-0.7c-0.3-0.2-0.6-0.4-0.9-0.5c-0.3-0.1-0.7-0.2-1-0.2c-0.6,0-1.1,0.1-1.5,0.3c-0.5,0.2-0.9,0.5-1.2,0.8c-0.3,0.4-0.6,0.8-0.8,1.2c-0.2,0.5-0.3,1-0.3,1.5c0,0.5,0.1,1.1,0.3,1.5c0.2,0.5,0.4,0.9,0.8,1.2c0.3,0.4,0.7,0.6,1.2,0.8c0.5,0.2,1,0.3,1.5,0.3c0.3,0,0.7-0.1,1-0.2c0.3-0.1,0.6-0.3,0.9-0.5c0.3-0.2,0.5-0.4,0.7-0.7c0.2-0.3,0.3-0.6,0.4-0.9l4.1,1.9c-0.2,0.5-0.5,1-0.9,1.6c-0.4,0.5-0.9,1-1.4,1.5c-0.6,0.4-1.2,0.8-2,1.1C26.8,16,25.9,16.2,24.9,16.2z\" \/><\/g><\/symbol><symbol id=\"share\" viewBox=\"0 0 32 20\"><path d=\"M20,6c0,0-7.9-0.1-13.2,3.3C1.6,12.7,0,20,0,20s5.1-5.4,9.8-7.2C14.9,10.9,20,12,20,12v6l12-8L20,0V6z\" \/><\/symbol><symbol id=\"fullscreen\" viewBox=\"0 0 32 32\"><g><g><polygon class=\"st11\" points=\"11.4,0 0,0 0,11.4 3.4,8 9.1,13.7 13.7,9.1 8,3.4 \" \/><\/g><g><polygon class=\"st11\" points=\"20.6,32 32,32 32,20.6 28.6,24 22.9,18.3 18.3,22.9 24,28.6 \" \/><\/g><g><polygon class=\"st11\" points=\"32,11.4 32,0 20.6,0 24,3.4 18.3,9.1 22.9,13.7 28.6,8 \" \/><\/g><g><polygon class=\"st11\" points=\"0,20.6 0,32 11.4,32 8,28.6 13.7,22.9 9.1,18.3 3.4,24 \" \/><\/g><\/g><\/symbol><symbol id=\"video\" viewBox=\"0 0 32 22\"><g><path d=\"M29,2.2c-0.7,0.2-4.6,3-7.9,5.3V2.1C21.1,1,20.1,0,19,0H2.1C1,0,0,1,0,2.1v17.7C0,21,1,22,2.1,22H19c1.2,0,2.1-1,2.1-2.1v-5.9c3.3,2.4,7.4,5.4,8.2,5.6c1.4,0.4,2.7-0.1,2.7-0.1V2.2C32,2.2,30.1,1.8,29,2.2z\" \/><\/g><\/symbol><\/svg> <\/p>\n<div class=\"shortcode video v2\" data-video-playlist=\"[{&quot;id&quot;:&quot;f22a000d-b2b3-4d83-a943-7d06fe352477&quot;,&quot;title&quot;:&quot;CISA director: Paper record key to keeping 2020 election secure&quot;,&quot;description&quot;:&quot;Christopher Krebs, director of the Cybersecurity and Infrastructure Security Agency, says a paper trail is one of the best risk management techniques against outside threats.&quot;,&quot;slug&quot;:&quot;cisa-director-paper-record-key-to-keeping-2020-election-secure&quot;,&quot;chapters&quot;:{&quot;data&quot;:[],&quot;paging&quot;:{&quot;total&quot;:0,&quot;limit&quot;:15,&quot;offset&quot;:0}},&quot;datePublished&quot;:&quot;2020-08-05 20:11:25&quot;,&quot;duration&quot;:322,&quot;mpxRefId&quot;:&quot;f5qy9u1qh7CaAgyixWiO6FbD5cXD8yfk&quot;,&quot;ratingVChip&quot;:&quot;TV-14&quot;,&quot;primaryTopic&quot;:{&quot;id&quot;:&quot;1c1fbb47-c387-11e2-8208-0291187b029a&quot;},&quot;author&quot;:{&quot;id&quot;:&quot;&quot;,&quot;firstName&quot;:&quot;&quot;,&quot;lastName&quot;:&quot;&quot;},&quot;primaryCollection&quot;:{&quot;id&quot;:&quot;040fa0bc-bf08-43dc-ac3d-ee7869a9fc85&quot;,&quot;title&quot;:&quot;CNET News Video&quot;},&quot;image&quot;:{&quot;path&quot;:&quot;https:\\\/\\\/cnet1.cbsistatic.com\\\/img\\\/iwcj5fPKffr5DeZr1MhXtga37fI=\\\/1280x720\\\/2020\\\/08\\\/05\\\/c51c2ff6-9eb3-4d98-bc6f-65c7b6df11b1\\\/krebs-image.jpg&quot;},&quot;thumbnail&quot;:&quot;https:\\\/\\\/cnet4.cbsistatic.com\\\/img\\\/Dfah3MmudPw1c745XwI47TLjJuk=\\\/194x109\\\/2020\\\/08\\\/05\\\/c51c2ff6-9eb3-4d98-bc6f-65c7b6df11b1\\\/krebs-image.jpg&quot;,&quot;closedCaptionPath&quot;:&quot;\\\/videos\\\/captions\\\/webvtt\\\/cisa-director-paper-record-key-to-keeping-2020-election-secure.vtt&quot;,&quot;urlPath&quot;:&quot;\\\/videos\\\/cisa-director-paper-record-key-to-keeping-2020-election-secure\\\/&quot;,&quot;isVertical&quot;:false,&quot;m3u8&quot;:&quot;https:\\\/\\\/cnetvideo.cbsistatic.com\\\/vr\\\/2020\\\/08\\\/05\\\/1772535363561\\\/436862_hls\\\/master.m3u8&quot;,&quot;mp4&quot;:&quot;https:\\\/\\\/cnetvideo.cbsistatic.com\\\/vr\\\/2020\\\/08\\\/05\\\/1772535363561\\\/Krebs_FINAL_436861_740.mp4&quot;,&quot;index&quot;:0}]\" readability=\"6\">\n<div class=\"embeddedVideoContainer\" tabindex=\"0\" aria-label=\"Play video CISA director: Paper record key to keeping 2020 election secure\" data-load-video=\"0\" data-video-id=\"f22a000d-b2b3-4d83-a943-7d06fe352477\" readability=\"7\">\n<div class=\"videoContainer\"> <svg class=\" play\"> <use aria-hidden=\"false\" xlink:href=\"#play\" \/>\n<\/svg> <svg class=\" pause\"> <use aria-hidden=\"false\" xlink:href=\"#pause\" \/>\n<\/svg> <\/p>\n<figure class=\" img\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cnet4.cbsistatic.com\/img\/kM110vCwSIuuvxetFLxaQJh9OlI=\/196x110\/2020\/08\/05\/c51c2ff6-9eb3-4d98-bc6f-65c7b6df11b1\/krebs-image.jpg\" class=\"photo\" alt height=\"110\" width=\"196\"><\/figure>\n<\/p><\/div>\n<p> <span class=\"bold\"> <span class=\"nowPlaying\">Now playing:<\/span> <span class=\"watchThis\">Watch this:<\/span> <\/span> CISA director: Paper record key to keeping 2020 election&#8230; <\/p>\n<p> <span class=\"duration\"> <svg class=\" video\"> <use aria-hidden=\"false\" xlink:href=\"#video\" \/>\n<\/svg><br \/>\n5:22 <\/span> <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p>&#8220;We have now cut off key infrastructure so those operating Trickbot will no longer be able to initiate new infections or activate ransomware already dropped into computer systems,&#8221; Microsoft&#8217;s vice president of customer security and trust, Tom Burt, said in a statement. <\/p>\n<p>The cybersecurity arm of the Department of Homeland Security expressed its gratitude for the work by Microsoft and its partners to disrupt the operation.<\/p>\n<p>&#8220;The types of harmful activities enabled by TrickBot, including ransomware attacks, are clearly on the rise in the U.S. and I firmly believe that we&#8217;re on the verge of a global emergency,&#8221; Cybersecurity and Infrastructure Security Agency director Chris Krebs said in a statement. &#8220;And with the U.S. election already underway, we need to be especially vigilant in protecting these systems.&#8221; <\/p>\n<h2>How the TrickBot takedown went down<br \/><\/h2>\n<p>The takedown came about through a partnership between Microsoft and cybersecurity companies Symantec, ESET, Black Lotus Labs, NTT and FS-ISAC. Tech companies aren&#8217;t the only ones who had their sights set on Trickbot &#8212; the Washington Post reported on Oct. 9 that the <a href=\"https:\/\/www.washingtonpost.com\/national-security\/cyber-command-trickbot-disrupt\/2020\/10\/09\/19587aae-0a32-11eb-a166-dc429b380d10_story.html\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">US military launched cyberattacks against Trickbot<\/a>.&nbsp;<\/p>\n<p>While that operation reportedly took down Trickbot for only about three days, the actions by Microsoft and the group of cybersecurity companies are expected to have a longer-term effect. Rather than using digital measures to take down the botnet, Microsoft went the legal route.&nbsp;<\/p>\n<p>The company filed a lawsuit in Virginia arguing that Trickbot violated Microsoft&#8217;s copyrights by using its software code for malicious purposes. Microsoft has used this argument to <a href=\"https:\/\/www.cnet.com\/news\/microsoft-sues-over-trademark-to-stop-covid-19-hacking-campaign\/\">take down<\/a> <a href=\"https:\/\/www.cnet.com\/news\/microsoft-takes-legal-action-against-north-korean-hackers\/\">other hacking operations<\/a> in the past, but Trickbot is the largest one yet.&nbsp;<\/p>\n<p>The court granted an order to allow Microsoft to disable IP addresses and servers used by Trickbot, and also block them from buying more servers.&nbsp;<\/p>\n<p>For years, the botnet had been particularly difficult to stop because it had a vast network of backups it could use. It had been primarily used for cybercrimes against banks and hospitals, but could have easily turned its targets onto election infrastructure.&nbsp;<\/p>\n<p>&#8220;Trying to disrupt this elusive threat is very challenging as it has various fallback mechanisms, and its interconnection with other highly active cybercriminal actors in the underground makes the overall operation extremely complex,&#8221; Jean-ian Boutin, head of threat research at ESET, said in a statement.&nbsp;<\/p>\n<p>The companies behind the takedown don&#8217;t expect the operators behind the world&#8217;s largest botnet to stay offline, and said they would continue taking legal actions if it rises again.&nbsp;<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31658\/Microsoft-Takes-Down-Hacking-Network-With-Potential-To-Disrupt-Election.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":37628,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8978],"class_list":["post-37627","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentmicrosoftusarussiabotnetfraud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Takes Down Hacking Network With Potential To Disrupt Election 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Takes Down Hacking Network With Potential To Disrupt Election 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-12T18:31:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1092\" \/>\n\t<meta property=\"og:image:height\" content=\"728\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft Takes Down Hacking Network With Potential To Disrupt Election\",\"datePublished\":\"2020-10-12T18:31:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\\\/\"},\"wordCount\":736,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election.jpg\",\"keywords\":[\"headline,government,microsoft,usa,russia,botnet,fraud\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\\\/\",\"name\":\"Microsoft Takes Down Hacking Network With Potential To Disrupt Election 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election.jpg\",\"datePublished\":\"2020-10-12T18:31:25+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election.jpg\",\"width\":1092,\"height\":728},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,microsoft,usa,russia,botnet,fraud\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentmicrosoftusarussiabotnetfraud\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft Takes Down Hacking Network With Potential To Disrupt Election\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Takes Down Hacking Network With Potential To Disrupt Election 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Takes Down Hacking Network With Potential To Disrupt Election 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-10-12T18:31:25+00:00","og_image":[{"width":1092,"height":728,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft Takes Down Hacking Network With Potential To Disrupt Election","datePublished":"2020-10-12T18:31:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\/"},"wordCount":736,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election.jpg","keywords":["headline,government,microsoft,usa,russia,botnet,fraud"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\/","name":"Microsoft Takes Down Hacking Network With Potential To Disrupt Election 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election.jpg","datePublished":"2020-10-12T18:31:25+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election.jpg","width":1092,"height":728},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-takes-down-hacking-network-with-potential-to-disrupt-election\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,microsoft,usa,russia,botnet,fraud","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentmicrosoftusarussiabotnetfraud\/"},{"@type":"ListItem","position":3,"name":"Microsoft Takes Down Hacking Network With Potential To Disrupt Election"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37627","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=37627"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37627\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/37628"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=37627"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=37627"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=37627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}