How F-Secure helps operators stay ‘bot-free’

Cybercrime doesn’t just affect end users. Infected networks cost providers huge losses through needing to deploy expensive internal resources to clean, repair and manage any damage caused. In addition to direct theft of data, operators experience additional financial pressures from increases in service calls from infected end-users, researching and refunding fraudulent charges, reduced network bandwidth and damaged brand association – let alone the risk of potential fines and penalties.

Reduce your risk, improve your anti-cybercrime activities, and enjoy more profitable customers with F-Secure AntiBot: a cutting-edge, new product specifically designed to clean an operator’s network of botnets.

  • Secure your network and attached devices
  • Provide customers a significantly differentiated offering via a more secure network
  • Reduce costs from increased help-desk usage, fraudulent billings, and repair costs associated with cyber crime
  • Provide customers with a safe and uncomplicated experience

F-Secure AntiBot is designed to automatically detect and identify infected network devices and remotely disinfect them. It can guide end-users through a simple cleanup process that reduces or eliminates the need for expensive and time-consuming calls to your helpdesk and support services – thus providing a more customer-centric and positive experience.

A Bot is a malware-infected device that gets taken over and remotely controlled by cybercriminals. A Botnet is created when cybercrimals are able to take over a number of devices and link them together to perform broader activities and more extensive damage – like sending mass spam that hogs a network bandwidth, sending text messages to premium numbers, or flooding recipients with unwanted ads. They can even take a device “hostage;” requiring a ransom to be paid before ceding control back to the owner.

“Botnets are not only extremely disrupting to consumers, in that they impact device and Internet performance, they are also a risk to their privacy.” says Pekka Mettälä, Head of Global Business Development at F-Secure. “Private credentials like passwords can be stolen, giving access to online bank accounts, social media accounts, and other personal data. Operators who can provide customers with more simplified or automated and robust protection from botnets, will enjoy a distinct advantage over their competitors as well as more satisfied and loyal customers.”

Operators benefit directly through reducing their network’s vulnerability and through doing their part towards stopping the proliferation of botnets and cybercrime. Expensive resources previously dedicated to repairs and maintenance after an infection is discovered, can now be utilized for more productive activities.

Customers benefit from an overall reduction of risk as well as a more simplified process for dealing with their infected devices.



More posts from this topic


Why your Apple Watch will probably never be infected by malware

On Tuesday Apple announced its latest iPhone models and a new piece of wearable technology some have been anxiously waiting for -- Apple Watch. TechRadar describes the latest innovation from Cupertino as "An iOS 8-friendly watch that plays nice with your iPhone." And if it works like your iPhone, you can expect that it will free of all mobile malware threats, unless you decide to "jailbreak" it. The latest F-Secure Labs Threat Report clears up one big misconception about iOS malware: It does exist, barely. In the first half of 2014, 295 new families and variants or mobile malware were discovered – 294 on Android and one on iOS.  iPhone users can face phishing scams and Wi-Fi hijacking, which is why we created our Freedome VPN, but the threat of getting a bad app on your iOS device is almost non-existent. "Unlike Android, malware on iOS have so far only been effective against jailbroken devices, making the jailbreak tools created by various hacker outfits (and which usually work by exploiting undocumented bugs in the platform) of interest to security researchers," the report explains. The iOS threat that was found earlier this year, Unflod Baby Panda, was designed to listen to outgoing SSL connections in order to steal the device’s Apple ID and password details. Apple ID and passwords have been in the news recently as they may have played a role in a series of hacks of celebrity iCloud accounts that led to the posting of dozens of private photos. Our Mikko Hypponen explained in our latest Threat Report Webinar that many users have been using these accounts for years, mostly to purchase items in the iTunes store, without realizing how much data they were actually protecting. But Unflod Baby Panda is very unlikely to have played any role in the celebrity hacks, as "jailbreaking" a device is still very rare. Few users know about the hack that gives up the protection of the "closed garden" approach of the iOS app store, which has been incredibly successful in keeping malware off the platform, especially compared to the more open Android landscape. The official Play store has seen some infiltration by bad apps, adware and spamware -- as has the iOS app store to a far lesser degree -- but the majority of Android threats come from third-party marketplaces, which is why F-Secure Labs recommends you avoid them. The vast majority of iPhone owners have never had to worry about malware -- and if the Apple Watch employs the some tight restrictions on apps, the device will likely be free of security concerns. However, having a watch with the power of a smartphone attached to your body nearly twenty-four hours a day promises to introduce privacy questions few have ever considered.    

Sep 9, 2014
BY Jason
Aug 28, 2014
BY Jason