Is Your PC Part of a Zombie Army Unit Without You Knowing It?
Speaking at the AusCERT conference in Australia's Gold Coast, Eugene Kaspersky, founder of Kaspersky Labs, said that the influence of organized crime on "Do I need a million computers to send spam? No. To do a DDoS attack, 5,000 or 10,000 PCs is more than enough. That is why virus writers and hackers have changed their tactics of infection--they don't need a global epidemic," said Kaspersky.
Zombie networks are groups of computers that have been infected by malware that allows the author to control the infected PC and use it to send spam or launch DDoS (distributed denial of service) attacks. the malicious software industry has led to a change of tactics. Instead of trying to create viruses and worms that infect as many computers as possible, authors of malicious software are instead trying to infect 5,000 or 10,000 computers at a time to create personalized zombie armies.
According to Kaspersky, organized criminals are advertising zombie computers for rent on underground newsgroups and Web pages. When they receive an order for a certain-size army, they set about trying to infect computers using infected e-mail attachments or socially engineered spam with links to malicious Web pages. As soon as they infect enough computers to fulfill the order, they stop using that particular piece of malicious software.
"Say the virus author needs 5,000 infected computers. They put the Trojan on a Web page and wait for 5,000 machines to be infected, then they remove the Trojan because that is enough," Kaspersky explained. "When they get a new request for another zombie network, they release a new Trojan. They are able to control the number of infected computers."
Adam Biviano, senior systems engineer at antivirus company Trend Micro, agrees. He said that by infecting a relatively small number of computers, the malicious software has a better chance of flying "under the radar" and not being spotted by antivirus companies.
"It makes sense to have a discreet number of PCs under your control and be able to sell that on," said Biviano, adding, "With 5,000 PCs under your control--none of which are being destroyed or showing actual qualifiable damage as a result--you will fit under the radar, probably make some money and you probably won't get arrested."
Kaspersky said that to fight this new tactic, antivirus companies have to be more thorough, scouring Web pages and e-mail attachments for new and obscure pieces of malicious software to ensure as few Trojans as possible escape.
"Before releasing the new infected code, (virus writers) test it using antivirus scanners and they don't release the new Trojan or worm if it is detected. I believe that if only 1,000 machines are infected, antivirus companies will never receive the infected file. That is why antivirus companies have to collect data reactively and get samples as quickly as possible," said Kaspersky.
Vincent Gullotto, vice president of McAfee AVERT (Anti-virus Emergency Response Team), said that antivirus companies are responding to the new threat by proactively seeking out new forms of malicious software.
"It is standard for us, Kaspersky, Symantec and some of the other prominent antivirus companies to scour the Web in many different ways. We go out looking for (malicious software) with a very aggressive search and we do passive searches, where we have machines that are just sitting around waiting to get attacked. When we see a machine getting attacked, we grab a sample rather quickly so we can add it to our database," said Gullotto.
For more information on virus protection search using keywords "virus protection" in your web browser.
Related Tags: online business, spam, email, spamming, outlook, bulk email, address book, spammers, inbox, zombie
Maurice S Clarke is founder of the wearable goods trading web site www.whatweusedtowear.com and lives in Rugby, UK. This article may be freely republished provided it remains intact.
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- Never Undervalue Secure Backups
The Internet can be a very intimidating place. It is full of information, and every day new busi - Lack of Internet Privacy - One Step Away from Identity Theft
Four Reasons to Use Privacy Software Unless you are a spammer, hacker, terrorist, or other such - Site Security Issues Abound
It has happened web wide and it has happened to the best of the best - NASA, DOD, Google, Micros - Online Security: How Secure are You When You Get on the Internet?
Internet technology specialists widely agree that security is becoming the primary concern of th - Software Engineering Standards Providing Industry Integrity
Software engineering is a relatively new career field in technology today in comparison to other - Protect Your E-mail by Obfuscatoin
E-mail harvesting is the process of obtaining lists of e-mail addresses from the internet. This is u - Antispyware Host File - Protect Your Computer Now With This Simple Fix
An antispyware host file is a simple defence mechanism against rogue sites that are out to get you a - What Key Features Make The Best Spyware Removal Programs?
Range Of FeaturesThe best spyware removal programs should combine multiple features so that you get - Online Job Scams and Identity Theft-What Every Job Hunter Needs to Know
There are three main types of common online job scams:1. Phony Job Offers-With this type of scam, In - Spybot Sickness - Spyware Flue
When we talk about spyware symptoms, we talk about both how you get spyware and what the symptoms of
Most viewed articles in this category:
- Parental Control Software - How Will It Help My Family?
Parental Control Software such as Safe Eyes, is a set of tools that allows parents to control what o - Designing IE Exclusive Sites Is Counterproductive And Puts Your Visitors At Risk
Excuse me for being so forthright, but designing a web site exclusively for a specific browser is do - Mind the letters and words in your password.
Radhika Venkata (c).1. Don't choose predictable passwords like asending or desending numbers or lett - Safe Password Tips for Better Computer Security
With so many online accounts to manage, most people tend to use the same password for everything. M - Minimising Credit Card Fraud - For Online Retailers
Well organized criminal organizations steal credit card numbers in many different ways (virus progra - Fraud Prevention Tips
Current areas where mail order, telephone order, and Internet fraud are most prevalent include:* Wes - Money Scams: How to Avoid Getting Ripped Off
Scams take many forms: overseas lotteries, get-rich-quick schemes, work-from-home jobs and hundreds - Protecting Your Websites From Search Engines
There are a great number of scenarios in which you should be protecting your websites from the searc - The Best Internet Privacy Software
Detect, Protect, Dis-infect, Reject, Delete, then - RepeatThe best internet privacy software isn't a - The Most Effective Spyware Removers
There are a number of things you need to look for when you are seeking the most effective spyware re