Language Selection

English French German Italian Portuguese Spanish

Hackers Grow Armies of Zombie PCs

Filed under
Security

Attackers are becoming increasingly aggressive as they look to grow their zombie armies of infected PCs, according to antivirus vendor McAfee. This week, the company reported that the number of systems infected with malicious software that allows the PC to be used for unauthorized purposes jumped by 303 percent during the second quarter of 2005 from the previous quarter.

Whereas high-profile attacks such as the MyDoom worm in 2004 generally left no doubt as to whether the user's system was infected, attackers are now using more subtle techniques, often invisibly seizing control of a machine with tiny programs called "bots" that await instructions from their creators, according to Vincent Gullotto, vice president of McAfee's Anti-virus and Vulnerability Emergency Response Team.

These bots allow the infected machine, sometimes called a "zombie," to be used for a variety of illegal purposes, such as sending spam or participating in a denial of service attack against a Web site, Gullotto says. "You're not hearing about a major outbreak every month, but people are not aware that there has become a much more subversive way that virus writers are spreading around the Internet," he says.

On the Increase

Researchers with Gullotto's team recorded nearly 13,000 cases of attempted bot hijackings, up from about 3000 during the first quarter of 2005. The company also reported that the number of adware and spyware programs was up 12 percent when compared to the first quarter of 2005.

Though McAfee says that all sorts of criminals are now involved in hacking, the company has noticed that money, rather than fame or notoriety, has increasingly been a motivating factor in attacks.

Rather than crashing users' systems or sending out huge quantities of e-mail, attackers are using malicious software such as the Mytob worm to install adware on personal computers. And organized criminals are emerging as a new and increasingly effective source of sophisticated attacks, Gullotto says. "There's a whole new ballgame that's being played."

By Robert McMillan
IDG News Service

More in Tux Machines

LibreOffice 4.4 Is Coming Soon With New Features

The release plan puts the LibreOffice 4.4.0 as being just days away, but what features are in store for this open-source office suite? Let's take a brief look. Read more

Completely open source, high-end laptop gets closer to reality

If you've wanted a laptop where all the software is free and open source (FOSS), you've usually had to settle for mediocre hardware. Even FOSS champion Richard Stallman is making do with a ThinkPad that's several years old. At last, though, it looks like you won't have to compromise your ideology for the sake of keeping up with the Joneses. Purism has successfully crowdfunded the Librem 15, a portable PC that combines modern parts (such as a 3.4GHz Core i7 and an optional 4K display) with software that's accessible from head to toe. The operating system (a variant of Trisquel GNU/Linux), hardware drivers and included apps are all free and open -- Purism is even trying to loosen up the BIOS and firmware. Read more

Your simple guide to Open Source technology

What does this mean in practice? First and foremost, it means that unlike traditional software development that is done behind closed doors and with the windows barred and by a small team, Open Source software development by its nature has many eye balls on it all of the time. Anyone can submit bug fixes or improvements and this generally translates into fixes and improvements happening at a much faster rate. Security vulnerabilities and exploits are usually fixed quickly too, which is good for everyone. Read more

Netrunner 14.1 OS Features a Different and Cool KDE Experience – Gallery

Netrunner 14.1, a GNU/Linux distribution based on Kubuntu, featuring KDE as the default desktop environment, is now available for download and it comes with a number of important improvements. Read more