{
	"id": "2b445903-0108-4868-be96-e4dd6e247546",
	"created_at": "2026-04-06T00:16:24.17758Z",
	"updated_at": "2026-04-10T03:22:07.848947Z",
	"deleted_at": null,
	"sha1_hash": "972bf5b92c47a6d0d9e03d3cbf14dc96e7555d66",
	"title": "Tag: Nitol",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 25047,
	"plain_text": "Tag: Nitol\r\nArchived: 2026-04-05 14:18:54 UTC\r\nLast week, Microsoft Corp. made headlines when it scored an unconventional if not unprecedented legal victory:\r\nConvincing a U.S. court to let it seize control of a Chinese Internet service provider’s network as part of a\r\ncrackdown on piracy.\r\nI caught up with Microsoft’s chief legal strategist shortly after that order was executed, in a bid to better\r\nunderstand what they were seeing after seizing control over more than 70,000 domains that were closely\r\nassociated with distributing hundreds of strains of malware. Microsoft said that within hours of the takeover order\r\nbeing granted, it saw more than 35 million unique Internet addresses phoning home those 70,000 malicious\r\ndomains.\r\nMicrosoft said Thursday that it convinced a U.S. federal court to grant it control over a botnet believed to be\r\nclosely linked to counterfeit versions Windows that were sold in various computer stores across China. The legal\r\nvictory also highlights a Chinese Internet service that experts say has long been associated with targeted,\r\nespionage attacks against U.S. and European corporations.\r\nSource: https://krebsonsecurity.com/tag/nitol/\r\nhttps://krebsonsecurity.com/tag/nitol/\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://krebsonsecurity.com/tag/nitol/"
	],
	"report_names": [
		"nitol"
	],
	"threat_actors": [],
	"ts_created_at": 1775434584,
	"ts_updated_at": 1775791327,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/972bf5b92c47a6d0d9e03d3cbf14dc96e7555d66.pdf",
		"text": "https://archive.orkl.eu/972bf5b92c47a6d0d9e03d3cbf14dc96e7555d66.txt",
		"img": "https://archive.orkl.eu/972bf5b92c47a6d0d9e03d3cbf14dc96e7555d66.jpg"
	}
}