Language Selection

English French German Italian Portuguese Spanish

Hackers Grow Armies of Zombie PCs

Filed under

Attackers are becoming increasingly aggressive as they look to grow their zombie armies of infected PCs, according to antivirus vendor McAfee. This week, the company reported that the number of systems infected with malicious software that allows the PC to be used for unauthorized purposes jumped by 303 percent during the second quarter of 2005 from the previous quarter.

Whereas high-profile attacks such as the MyDoom worm in 2004 generally left no doubt as to whether the user's system was infected, attackers are now using more subtle techniques, often invisibly seizing control of a machine with tiny programs called "bots" that await instructions from their creators, according to Vincent Gullotto, vice president of McAfee's Anti-virus and Vulnerability Emergency Response Team.

These bots allow the infected machine, sometimes called a "zombie," to be used for a variety of illegal purposes, such as sending spam or participating in a denial of service attack against a Web site, Gullotto says. "You're not hearing about a major outbreak every month, but people are not aware that there has become a much more subversive way that virus writers are spreading around the Internet," he says.

On the Increase

Researchers with Gullotto's team recorded nearly 13,000 cases of attempted bot hijackings, up from about 3000 during the first quarter of 2005. The company also reported that the number of adware and spyware programs was up 12 percent when compared to the first quarter of 2005.

Though McAfee says that all sorts of criminals are now involved in hacking, the company has noticed that money, rather than fame or notoriety, has increasingly been a motivating factor in attacks.

Rather than crashing users' systems or sending out huge quantities of e-mail, attackers are using malicious software such as the Mytob worm to install adware on personal computers. And organized criminals are emerging as a new and increasingly effective source of sophisticated attacks, Gullotto says. "There's a whole new ballgame that's being played."

By Robert McMillan
IDG News Service

More in Tux Machines

Leftovers: Software

  • Kafka and syslog-ng
    First of all, let me introduce Kafka, a high-throughput distributed messaging system. It was originally developed by LinkedIn as a backbone of a website activity tracking infrastructure. Once open source, it was developed further under the umbrella of the Apache Foundation. In 2014 Confluent was founded to provide enterprise level support to Kafka users. Kafka is now used by major companies, including Netflix, Twitter and PayPal. There are now many more uses for Kafka: message queuing, log aggregation, stream processing or as a commit log.
  • Nmap 7.00 Has Been Released
    As you may know, Nmap is a command-line network exploration tool that supports ping scanning to determine the online hosts, port scanning techniques and TCP/IP fingerprinting for remote device identification.
  • Atom 1.2.4 Has Been Released
  • Vuze 5.7 (Open-Source BitTorrent Client) Has Been Released
  • Aptik 1.6.6 (Backup Software) Has Been Released
    As you may know, Aptik is an open-source application that enables the users to easily perform and restore backups of PPAs, aplications and packages in Ubuntu, Linux Mint, Elementary OS and other Ubuntu derivates.
  • Linphone 3.9.1 Brings Only Bug-Fixes
    As you may know, Linphone is an open-source VoIP service that allows the users to perform voice calls, video calls and text conversations with friends and other Linphone users.
  • Install QGifer 0.2.3 RC2 on Ubuntu
    Up to date packages are available via some third party PPA, so installing the software on Ubuntu 15.10 Wily Werewolf, Ubuntu 14.04 Trusty Tahr, Linux Mint 17.x, Elementary OS 0.3 Freya and other Ubuntu derivative systems is easy.
  • Wireshark 2.0 Has Been Released
    As you already know, Wireshark is an open-source protocol analyzer software, very used for monitoring the network traffic.
  • Kodi 16.0 Beta 2 “Jarvis” Brings Changes

today's howtos

Leftovers: Gaming

Krita 2.9