{"guid":"import-1d64518c2e5554b342","title":"Cybercrime 2.0","subtitle":"Storm Worm","slug":"24c3-2318-en-cybercrime20","link":"http://events.ccc.de/congress/2007/Fahrplan/events/2318.en.html","description":"Not only the Web has reached level 2.0, also attacks against computer systems have advanced in the last few months: Storm Worm, a peer-to-peer based botnet, is presumably one of the best examples of this development.\n","original_language":"eng","persons":["Thorsten Holz"],"tags":["24c3"," Hacking"],"view_count":66,"promoted":false,"date":"2007-12-27T01:00:00.000+01:00","release_date":"2007-12-28T01:00:00.000+01:00","updated_at":"2026-01-25T01:00:07.513+01:00","length":3525,"duration":3525,"thumb_url":"https://static.media.ccc.de/media/congress/2007/24c3-2318-en-cybercrime20_high.jpg","poster_url":"https://static.media.ccc.de/media/congress/2007/24c3-2318-en-cybercrime20_high_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2007/import-1d64518c2e5554b342-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2007/import-1d64518c2e5554b342-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/24c3-2318-en-cybercrime20","url":"https://api.media.ccc.de/public/events/import-1d64518c2e5554b342","conference_title":"24C3: Volldampf voraus!","conference_url":"https://api.media.ccc.de/public/conferences/24c3","related":[{"event_id":1075,"event_guid":"import-278b33c334c7d98406","weight":1},{"event_id":1088,"event_guid":"import-823765436f0318a89b","weight":1},{"event_id":1133,"event_guid":"import-63fd9556269ebc5a94","weight":1},{"event_id":1170,"event_guid":"import-9393bb30f24ac7a9d4","weight":1},{"event_id":1177,"event_guid":"import-8787f59e50a6816bed","weight":1},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":1},{"event_id":1190,"event_guid":"import-093f9267898a1907dd","weight":1},{"event_id":1200,"event_guid":"import-fa002ccb6787ebc14f","weight":1},{"event_id":1205,"event_guid":"import-857941dfbc4586b4f7","weight":2},{"event_id":1218,"event_guid":"import-16fe6a6e95d7c4f819","weight":1},{"event_id":1240,"event_guid":"import-1885c7f280b77ff85b","weight":1},{"event_id":1242,"event_guid":"import-d175259861c6ba7d80","weight":1},{"event_id":1251,"event_guid":"import-fb1aefc36f7a295121","weight":1},{"event_id":1341,"event_guid":"import-a8f4cba930451edf37","weight":1},{"event_id":1810,"event_guid":"d3O96YnMHkiPLhp50TPJAA","weight":1},{"event_id":2515,"event_guid":"b8a7511e-143d-45c5-b974-2e91dab18814","weight":1},{"event_id":2533,"event_guid":"c1f34fda-54f2-407c-b68c-44dafc820282","weight":1},{"event_id":2938,"event_guid":"03c8501f-d327-4228-a9fe-2635370d25d2","weight":1},{"event_id":4943,"event_guid":"0101e48d-bf0e-43f2-a690-a1d114088f7f","weight":1}],"recordings":[{"size":118,"length":3525,"mime_type":"video/webm","language":"eng","filename":"24c3-2318-en-cybercrime20.webm","state":"downloaded","folder":"webm","high_quality":true,"width":640,"height":480,"updated_at":"2016-01-27T11:03:27.286+01:00","recording_url":"https://cdn.media.ccc.de/congress/2007/webm/24c3-2318-en-cybercrime20.webm","url":"https://api.media.ccc.de/public/recordings/2106","event_url":"https://api.media.ccc.de/public/events/import-1d64518c2e5554b342","conference_url":"https://api.media.ccc.de/public/conferences/24c3"}]}