Language Selection

English French German Italian Portuguese Spanish

Hackers Grow Armies of Zombie PCs

Filed under
Security

Attackers are becoming increasingly aggressive as they look to grow their zombie armies of infected PCs, according to antivirus vendor McAfee. This week, the company reported that the number of systems infected with malicious software that allows the PC to be used for unauthorized purposes jumped by 303 percent during the second quarter of 2005 from the previous quarter.

Whereas high-profile attacks such as the MyDoom worm in 2004 generally left no doubt as to whether the user's system was infected, attackers are now using more subtle techniques, often invisibly seizing control of a machine with tiny programs called "bots" that await instructions from their creators, according to Vincent Gullotto, vice president of McAfee's Anti-virus and Vulnerability Emergency Response Team.

These bots allow the infected machine, sometimes called a "zombie," to be used for a variety of illegal purposes, such as sending spam or participating in a denial of service attack against a Web site, Gullotto says. "You're not hearing about a major outbreak every month, but people are not aware that there has become a much more subversive way that virus writers are spreading around the Internet," he says.

On the Increase

Researchers with Gullotto's team recorded nearly 13,000 cases of attempted bot hijackings, up from about 3000 during the first quarter of 2005. The company also reported that the number of adware and spyware programs was up 12 percent when compared to the first quarter of 2005.

Though McAfee says that all sorts of criminals are now involved in hacking, the company has noticed that money, rather than fame or notoriety, has increasingly been a motivating factor in attacks.

Rather than crashing users' systems or sending out huge quantities of e-mail, attackers are using malicious software such as the Mytob worm to install adware on personal computers. And organized criminals are emerging as a new and increasingly effective source of sophisticated attacks, Gullotto says. "There's a whole new ballgame that's being played."

By Robert McMillan
IDG News Service

More in Tux Machines

Linux Mint Xfce: Moving From Maya to Rebecca

Here’s the problem. For the last couple of years or so we’ve been using Mint’s Xfce edition of Maya (that would be version 13 for those who read the box scores) on nearly all of the machines here at FOSS Force. As Maya will be supported until 2017, we had absolutely no plans to make any upgrades until then, as taking time out for the tedious process of upgrading our machines isn’t one of my favorite things to do — and I’m the one who’d be doing the upgrading. Read more

Google turns its Android font Roboto into an open source project

Designed by Christian Robinson, the Roboto font files were first released in 2011 under the Apache license. Now, the company is organizing the files and the font production toolchain into a fully realized open source project on Github. Read more

New websites for Fedora 22

We started not long time ago, just a few days after F22 Beta release and it was challenging to finish all the work for these websites, collect informations from Spin SIGs, get legal approval, make new translation resources and and and. Read more Also: Fedora 22 will contain some fc21 packages statscache - thoughts on a new Fedora Infrastructure backend service

Here’s how to make your Ubuntu Desktop beautiful

So instead of hurling insults at the confused penguin nestlings, I have decided to help by giving you my own guide on how to make Ubuntu beautiful. Please note there are many ways to do this, this is just my way and because I detest the Dock-style launchers (bottom of the screen) do not ask me about them.If I wanted a Mac I would buy a Mac and use their Docking feature. Who am I kidding here, If I wanted a Mac, I would not be able to afford a Mac. Read more