Is Your PC Part of a Zombie Army Unit Without You Knowing It?


by Maurice Clarke - Date: 2006-12-21 - Word Count: 616 Share This!

Virus authors are choosing not to create global epidemics--infections of the type caused by Melissa or Blaster--because that distracts them from their core business of creating and selling zombie networks, according to antivirus experts.

Speaking at the AusCERT conference in Australia's Gold Coast, Eugene Kaspersky, founder of Kaspersky Labs, said that the influence of organized crime on "Do I need a million computers to send spam? No. To do a DDoS attack, 5,000 or 10,000 PCs is more than enough. That is why virus writers and hackers have changed their tactics of infection--they don't need a global epidemic," said Kaspersky.

Zombie networks are groups of computers that have been infected by malware that allows the author to control the infected PC and use it to send spam or launch DDoS (distributed denial of service) attacks. the malicious software industry has led to a change of tactics. Instead of trying to create viruses and worms that infect as many computers as possible, authors of malicious software are instead trying to infect 5,000 or 10,000 computers at a time to create personalized zombie armies.

According to Kaspersky, organized criminals are advertising zombie computers for rent on underground newsgroups and Web pages. When they receive an order for a certain-size army, they set about trying to infect computers using infected e-mail attachments or socially engineered spam with links to malicious Web pages. As soon as they infect enough computers to fulfill the order, they stop using that particular piece of malicious software.

"Say the virus author needs 5,000 infected computers. They put the Trojan on a Web page and wait for 5,000 machines to be infected, then they remove the Trojan because that is enough," Kaspersky explained. "When they get a new request for another zombie network, they release a new Trojan. They are able to control the number of infected computers."

Adam Biviano, senior systems engineer at antivirus company Trend Micro, agrees. He said that by infecting a relatively small number of computers, the malicious software has a better chance of flying "under the radar" and not being spotted by antivirus companies.

"It makes sense to have a discreet number of PCs under your control and be able to sell that on," said Biviano, adding, "With 5,000 PCs under your control--none of which are being destroyed or showing actual qualifiable damage as a result--you will fit under the radar, probably make some money and you probably won't get arrested."

Kaspersky said that to fight this new tactic, antivirus companies have to be more thorough, scouring Web pages and e-mail attachments for new and obscure pieces of malicious software to ensure as few Trojans as possible escape.

"Before releasing the new infected code, (virus writers) test it using antivirus scanners and they don't release the new Trojan or worm if it is detected. I believe that if only 1,000 machines are infected, antivirus companies will never receive the infected file. That is why antivirus companies have to collect data reactively and get samples as quickly as possible," said Kaspersky.

Vincent Gullotto, vice president of McAfee AVERT (Anti-virus Emergency Response Team), said that antivirus companies are responding to the new threat by proactively seeking out new forms of malicious software.

"It is standard for us, Kaspersky, Symantec and some of the other prominent antivirus companies to scour the Web in many different ways. We go out looking for (malicious software) with a very aggressive search and we do passive searches, where we have machines that are just sitting around waiting to get attacked. When we see a machine getting attacked, we grab a sample rather quickly so we can add it to our database," said Gullotto.

For more information on virus protection search using keywords "virus protection" in your web browser.


Related Tags: online business, spam, email, spamming, outlook, bulk email, address book, spammers, inbox, zombie

Maurice S Clarke is founder of the wearable goods trading web site www.whatweusedtowear.com and lives in Rugby, UK. This article may be freely republished provided it remains intact.

Your Article Search Directory : Find in Articles

© The article above is copyrighted by it's author. You're allowed to distribute this work according to the Creative Commons Attribution-NoDerivs license.
 

Recent articles in this category:



Most viewed articles in this category: