Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Spam

20,000 Zombie PCs -- $3000 423

Saint Aardvark writes "From F-Secure blog comes these links to two USA Today articles on spamming. The first gives an example of how a grandmother ended up becoming a security expert after Comcast cut her connection for spamming. The second quotes spammers advertising networks of Zombie PCs for sale. The price? $3000 for 20,000 machines."
This discussion has been archived. No new comments can be posted.

20,000 Zombie PCs -- $3000

Comments Filter:
  • by GTRacer ( 234395 ) <gtracer308@nOsPAm.yahoo.com> on Thursday September 09, 2004 @04:07PM (#10205109) Homepage Journal
    ...Can I get folding@home running on those 20 thousand boxes?

    GTRacer
    - Things to do

    • by NotQuiteReal ( 608241 ) on Thursday September 09, 2004 @04:11PM (#10205177) Journal
      No - but you can spam a lot of people and ask them if they would like to run folding@home.

      Probably a lot of them would, after all look how many people clicked on something to become a zombie in the first place...

    • caveat emptor (Score:5, Interesting)

      by WormholeFiend ( 674934 ) on Thursday September 09, 2004 @04:44PM (#10205677)
      If spammers are scammers, can you really expect good value for your money?

      I fully expect follow-up news stories on how someone who wanted to open a business online fell for a mass marketing scam, paying spammers thousands of dollars only to see the spammers vanish in thin air with their money.
    • by Duncan3 ( 10537 ) on Thursday September 09, 2004 @05:13PM (#10206072) Homepage
      *laughs*

      Um, no, we really wouldn't appreciate you doing that with our software. And it is against our terms of use. http://vsp27.stanford.edu/license.txt [stanford.edu]

      But back in my d.net days, we estimated that about 1/3 to 1/2 of all installs were zombies or forgotten. The original 5 proxies (hardcoded IP's, including my old dorm IP) probably still get pounded on after all these years.
  • Obligatory (Score:5, Funny)

    by Anonymous Coward on Thursday September 09, 2004 @04:08PM (#10205120)
    I, for one, welcome our new security grandmother overlord. All bow to thee.
  • by jaxdahl ( 227487 ) on Thursday September 09, 2004 @04:08PM (#10205128)
    I wonder how the processing power would compare to WETA's supercomputer cluster and their pricing. It would be slower to coummunicate data among the computers and ensure data quality, but I wonder how it compares.
  • Whose fault? (Score:5, Insightful)

    by RollingThunder ( 88952 ) on Thursday September 09, 2004 @04:09PM (#10205137)
    Heather Hall can trace the start of her online banking nightmare to the day she received what she thought was a legitimate e-mail request from Bank of America asking her to click a link to a bank Web page. The 27-year-old health services worker typed in her login, password and account number. ...
    Bank of America agreed to reimburse the money stolen from Hall's account, but only after she badgered them. "They wanted me to believe it was my fault," says Hall.

    Yes, it's her fault. She did something foolish.
    • Re:Whose fault? (Score:5, Insightful)

      by Renraku ( 518261 ) on Thursday September 09, 2004 @04:12PM (#10205209) Homepage
      Scams are criminal acts. Thus, the money was removed from the bank due to a criminal act. A bank that loses money to a criminal act that refuses to reimburse its customers might well lose its status as a bank. They took from her, without her permission, money from her bank account. Which is stealing, fraud, etc, etc. Maybe it was her fault it got stolen, but the money was stolen, from the bank.
      • Re:Whose fault? (Score:3, Insightful)

        by iCEBaLM ( 34905 )
        If I walk up to you on the street and say "Hey, I'm from Bank of America, I need your bank account information." and then you proceed to give it to me, then it is indeed your fault.
        • Re:Whose fault? (Score:5, Insightful)

          by stratjakt ( 596332 ) on Thursday September 09, 2004 @04:26PM (#10205426) Journal
          Maybe technically, but that's not how the law works (thankfully).

          Or do you think every time you hand a credit/debit card to a cashier at K-mart, that gives them the right to start charging things to your account?

          Hell, your account number and routing info is on a cheque. So everyone you write a cheque to gets unlimited access to your chequing account?

          Thinking bigger, all I need is your SSN (easily obtained) to steal your identity and take out a few hundred thou in mortages.

          And it's all your fault! You gave it to me when you came to work for me! Hahahaha.

          If BoA allows any unauthorized person to remove money from my account, it is their fault.

          It doesn't matter how they came across my PIN or account number.
        • Re:Whose fault? (Score:5, Insightful)

          by bfields ( 66644 ) on Thursday September 09, 2004 @04:38PM (#10205605) Homepage
          If I walk up to you on the street and say "Hey, I'm from Bank of America, I need your bank account information." and then you proceed to give it to me, then it is indeed your fault.

          The closer analogy would be you walking up to me, saying "Hey, the Bank of America is over there", and giving me directions to an address where you have, overnight, erected an identical replica of a bank of america branch. (OK, perhaps the font on the logo is just slightly wrong if I think to look really closely.)

          In retrospect, I shouldn't have trusted directions from a random stranger, but by the time I'm standing there with the bank branch in front of me and the original referral already forgotten, it may not really cross my mind to doubt its legitimacy.

          The real idiocy here is all the banks setting up "secure" websites where you authenticate by sending them one secret (or maybe one of a few secrets), with the result that all it takes is for that secret to be compromised once, and your identity is compromised forever.

          Perhaps this will finally them that they need something better. (Surely some kind of USB dongle/smartcard-like thingy would be cheap enough now?)

          --Bruce Fields

          • Re:Whose fault? (Score:3, Insightful)

            by schon ( 31600 )
            The closer analogy would be you walking up to me, saying "Hey, the Bank of America is over there", and giving me directions to an address where you have, overnight, erected an identical replica of a bank of america branch. (OK, perhaps the font on the logo is just slightly wrong if I think to look really closely.)

            And even closer analogy than that would be you saying "I work for the Bank of America - you must go to that new office over there and enter your banking information, because otherwise we'll shut
          • Re:Whose fault? (Score:5, Interesting)

            by Brandybuck ( 704397 ) on Thursday September 09, 2004 @04:55PM (#10205830) Homepage Journal
            Similar scams have been played in real life with fake ATMs...
      • Re:Whose fault? (Score:3, Insightful)

        by LoudMusic ( 199347 )
        Scams are criminal acts. Thus, the money was removed from the bank due to a criminal act. A bank that loses money to a criminal act that refuses to reimburse its customers might well lose its status as a bank. They took from her, without her permission, money from her bank account. Which is stealing, fraud, etc, etc. Maybe it was her fault it got stolen, but the money was stolen, from the bank.

        Though I do agree that this is the law and that you are correct, I disagree with the law. Fraud and scams have b
      • Scams are criminal acts. Thus, the money was removed from the bank due to a criminal act. A bank that loses money to a criminal act that refuses to reimburse its customers might well lose its status as a bank.

        And robbing me at gunpoint while I take money out of an ATM is a criminal act also. Should I expect Bank of America to reimburse my lost funds? I might have a case against them if I can prove that they didn't erect adequate security measures around their ATM. But nobody ever told me I was guarantee

      • Comment removed (Score:4, Insightful)

        by account_deleted ( 4530225 ) on Thursday September 09, 2004 @05:29PM (#10206228)
        Comment removed based on user account deletion
        • It followed the proper security procedures involving the use of a login name, password, and bank account number.

          No. It didn't follow the proper security procedures. It followed its choice of security procedures. The success of this kind of phishing scam is evidence that those security procedures are not proper; they're inadequate because they're so easily defeated with a bit of social engineering. The bank needs to design a better security system- one that uses a time-dependent smart card, for instanc

        • by Gleef ( 86 )
          That's the key: "They took from her." They didn't steal from the bank. There wasn't negligence on the part of the bank. The bank didn't leak her account number, login name, or password. She did. She fell for a scam through no apparent fault of the bank. And now we all pay for it in the form of higher fees, lower savings account interest, etc.

          Banks are legally responsible for securing the funds in your account, and for only giving those funds to authorized people. To do this, banks have a wide number of s
    • Re:Whose fault? (Score:3, Insightful)

      by AKAImBatman ( 238306 ) *
      Have you seen these emails? They're damned convincing. Even the site you go to looks like the real thing, and all the links go back to the real thing. If you don't know enough to understand that you should only do business on THE EXACT DOMAIN that you've done business with, there's little you could do to realize that it's not legit.

      Things get even worse when someone registers a domain like "ebay.it" or "citlbank.com". Even many close examinations would fail to note the problem in the URL.
      • Re:Whose fault? (Score:5, Informative)

        by Anonymous Coward on Thursday September 09, 2004 @04:28PM (#10205444)
        Actually, the problem is far worse than this.

        With the ability to register unicode domain names, you may indeed see www.citibank.com and have no idea that the "a" is from the russian alphabet and therefore points to a different server and IP, even though visually, right down to the pixel, they are identical.

        All browsers should show warnings for any domain containing characters from multiple languages, or not permit them at all. I can think of no legitimate use for them.
      • Re:Whose fault? (Score:3, Interesting)

        by kallisti ( 20737 )
        Have you seen these emails? They're damned convincing,


        Sounds like a good time to try the Phishing IQ test [mailfrontier.com]. As for using the exact domain, lots of sites use a different provider for their online commerce, so that won't necessarily work.

    • Re:Whose fault? (Score:5, Interesting)

      by lpangelrob2 ( 721920 ) on Thursday September 09, 2004 @04:21PM (#10205344) Journal
      Foolish, yes, but from a non-nerd point of view, not so obvious. It looks like it comes from the company. Why not provide their login, password and account number?

      Since I haven't sensed that a widespread educational movement is in place to tell users otherwise (besides the occasional article in the newspaper, and I personally believe that doesn't count), can someone else step up to the plate? It sucks to have to repeat the "who's responsibility is it"? thing ad infinitum.

      So here's a story... I have two Macs hooked up at home. Comcast gives you the cable modem and basically just tells you to plug it in. Not surprisingly, if I were to have an old WinXP system that was stuck on dial-up (I can't download 400 MB service packs or security updates), I would be virus infected. Fortunately, I had OS X with a firewall... except they told me to disable the firewall and virus software since I was having problems. If that works, ordinary user thinks, "Wow, well if I can't use a high-speed internet connection with a firewall/virus software, what's the point"? That seems like a setup for disaster.

      Remember, most users come up with questions like this [isprank.com]. I don't think they're at all aware of what can happen, or what the effects of identity theft are, or how much it sucks. All they know is that geeks like us tend to berate them, companies like Comcast give them a mile of rope to hang themselves, and companies like Microsoft push insecure solutions that have enough security holes to cause companies like Comcast to shut off their internet access.

      Come on, we can do better, all around.

  • No wonder... (Score:4, Interesting)

    by Meostro ( 788797 ) * on Thursday September 09, 2004 @04:09PM (#10205143) Homepage Journal
    Zombie victim Carty took matters into her own hands: She did research on how to clean up and protect her PC and diligently updates programs that scan her computer for various types of malicious code. Her PC now runs clean. "I had no clue at Christmas that I would become a security expert," she says.

    So that's all it takes to be a security expert these days? No f'ing wonder there are so many security problems these days

    Also, it lightens my heart and makes me feel all warm and fuzzy that it only took "as many as 70,000 pieces of mail" in a day to get Comcast to shut her down.
    • by bludstone ( 103539 ) on Thursday September 09, 2004 @04:12PM (#10205204)
      Holy crap. That makes me a secuirty expert! Time to update the resume!
      • Holy crap. That makes me a secuirty expert! Time to update the resume!

        If I were you I'd brush up on my spell checker skills before firing off those CVs...
    • Yeah, she installs NAV and she's a security expert.

      By that token, everyone who's installed SP2 for XP is now a security expert.

      Are you linux guys listening? Huh?

      When's the last time YOU updated YOUR virus definitions? If you ever wanted proof that linux is a hobby OS, and not for security experts like Gramma Carty, this is it.
    • Re:No wonder... (Score:4, Insightful)

      by jazman_777 ( 44742 ) on Thursday September 09, 2004 @04:20PM (#10205330) Homepage
      So that's all it takes to be a security expert these days?

      A one-eyed man in the land of the blind is King.

    • Re:No wonder... (Score:3, Insightful)

      by hunterx11 ( 778171 )
      The sad part is that she is a security expert compared to most people. If the majority of people didn't know that cars used internal combustion engines, you'd practically be a car wizard if you knew things like that the car has a transmission and different gears.
  • by Rubberpants.net ( 804718 ) on Thursday September 09, 2004 @04:09PM (#10205151) Homepage
    "When I pay my water bill, I expect my water to be drinkable out of the tap. Today, when you pay your Internet bill, the data you get is not consumable."

    Not without some kind of sauce or dressing. Plain 1's and 0's taste like cardboard.

  • Heres an idea! (Score:3, Interesting)

    by blankinthefill ( 665181 ) <blachancNO@SPAMgmail.com> on Thursday September 09, 2004 @04:10PM (#10205162) Journal
    Lets buy a whole bunch of these zombified pcs, and launch a DDoS attack against the isps of known spammers! It may force some action, and I think it would be worth the cost.
  • Security Expert? (Score:5, Insightful)

    by rvw14 ( 733613 ) on Thursday September 09, 2004 @04:12PM (#10205191)

    Zombie victim Carty took matters into her own hands: She did research on how to clean up and protect her PC and diligently updates programs that scan her computer for various types of malicious code. Her PC now runs clean. "I had no clue at Christmas that I would become a security expert," she says.

    It is quite sad that a person who just updates their computer and runs a virus scanner is now considered a "security expert."

  • by MikeMacK ( 788889 ) on Thursday September 09, 2004 @04:13PM (#10205214)
    And, much like zombies of voodoo legend, they mindlessly do the bidding of their masters and help commit crimes online.

    I didn't realize the zombies of voodoo legend were online.

  • by AndroidCat ( 229562 ) on Thursday September 09, 2004 @04:13PM (#10205222) Homepage
    Telenor takes down 'massive' botnet [securityfocus.com] (From the story, they didn't really take down the botnet, just rendered it headless for a little while.)
  • Odd. (Score:5, Interesting)

    by nathan s ( 719490 ) on Thursday September 09, 2004 @04:13PM (#10205224) Homepage

    I have to say, I don't understand how people get into so much trouble.

    Maybe I've been lucky, but I've ran a Windows XP system for about a year now (and a Windows 98SE system for about 2 years prior under the same conditions), doing the occasional patches from Windows Update, without a virus scanner or firewall. If I do something stupid that makes me suspect that I've contracted something, I'll drop over to http://housecall.antivirus.com/ [antivirus.com] and do a quick scan. This generally only happens when I'm trying to find a crack for something on a P2P network and the bastards have embedded a keystroke logger or some other little nasty in a trojan crack package.

    Otherwise, I do an occasional glance-over at the list of processes running, and if my modem is lighting up like a Christmas tree I might fire up Sygate Personal Firewall or something just to see what's happening with the traffic, but I've never seen it give me real cause for concern. I still get some port traffic for the old Code Red worms and what not, but nothing that seems to have been really problematic.

    As I said, maybe I'm just lucky. Then again, maybe I don't use Internet Explorer or Outlook Express, and maybe that helps a lot. Who knows.:-)

    • Re:Odd. (Score:3, Funny)

      by Lispy ( 136512 )
      Errr, have you looked up the zombie auction and did you detect any familiar sounding subnets? ;-)
    • Re:Odd. (Score:3, Insightful)

      Maybe I've been lucky, but I've ran a Windows XP system for about a year now (and a Windows 98SE system for about 2 years prior under the same conditions), doing the occasional patches from Windows Update, without a virus scanner or firewall. If I do something stupid that makes me suspect that I've contracted something, I'll drop over to http://housecall.antivirus.com/ and do a quick scan. This generally only happens when I'm trying to find a crack for something on a P2P network and the bastards have embedd
  • by Animats ( 122034 ) on Thursday September 09, 2004 @04:13PM (#10205226) Homepage
    It's interesting that articles like this don't blame Microsoft. One wonders how Microsoft arranges that.
    • by NatasRevol ( 731260 ) on Thursday September 09, 2004 @04:25PM (#10205409) Journal
      Money? Lots and lots of money?

    • by PhoenixFlare ( 319467 ) on Thursday September 09, 2004 @04:27PM (#10205437) Journal
      And one wonders why users do not recieve some of they blame they rightly deserve, either.

      First lady in the story - obviously had zero protection beforehand, and it took a major problem w/her connection being disconnected before she got some. If nothing else, at least it sounds like she has the concept of basic security down a little better now.

      Second lady mentioned - a single call to her bank for verification would have likely saved her any trouble. I have gotten several "phishing" mails myself, and they are incredibly easy to recognize - often from a bank I have no accounts with or that never sends mail otherwise, they contain grammatical/spelling errors that would never appear in a real mail, and ask for information that the real bank would have absolutely no reason to need verified.

      Third lady mentioned - more Microsoft's fault than the others, due to the security holes. Still, it sounds like she either didn't patch things, opened a nasty attachment, or otherwise brought the software on through her own action. Hard to tell since they don't mention anything by name.

      So yes, Microsoft is evil. But don't fool yourself into thinking that users aren't contributing their share of problems either.
  • by syrinje ( 781614 ) on Thursday September 09, 2004 @04:14PM (#10205239)
    Very few people realise that deploying a cheap effective reverse firewall will save them from being unwitting spam zombies (kinda sounds like sex slaves don't it? It sure is as demeaning!).
    Granny had the right ideas.
    Home users, please note - a. You need a firewall
    b. You need a reverse firewall
    c. You need to dump IE and use Firefox
    d. You need to try dumping windoze and move on - that puppy is probably crapping all over your machine.
    --
  • by FluffyWhiteBunny ( 771314 ) on Thursday September 09, 2004 @04:14PM (#10205240)
    Are these Scoobie Doo type zombies? They aren't all that bad it's just some guy with a mask. As long as it's not the new "Dawn of the Dead" uberzombies I think we'll all be ok, just walk around them.
  • Spam declining? (Score:3, Interesting)

    by gtrubetskoy ( 734033 ) * on Thursday September 09, 2004 @04:15PM (#10205249)

    Actually, according to my spammeter [ispol.com] the amount of spam has been slightly declining over the past few months. I'm still at around 400/day level though...
  • by Onimaru ( 773331 ) on Thursday September 09, 2004 @04:16PM (#10205260)

    ...the ability to DoS SCO for the rest of the century...priceless.

    There are some things money can't buy. For the rest, there's my Zombie Army of Evil.

  • Funny (Score:5, Funny)

    by suwain_2 ( 260792 ) on Thursday September 09, 2004 @04:20PM (#10205325) Journal
    It's funny you should mention computer problems.

    Whenever I view this it.slashdot.org site, everything on my screen is all washed-out.

    Is this a symptom of being a zombie PC?
  • by jamezilla ( 609812 ) on Thursday September 09, 2004 @04:21PM (#10205340) Homepage
    This sounds like a good deal for the authorities. For 3 grand you get:
    1. a list of machines that need to be cleaned up
    2. a bank account or other information that can be used to track down the spammers/crackers
    I guarantee $3k is cheaper than what it would actually cost tax payers if the authorities did their job with normal investigative work.
    • by Anonymous Coward on Thursday September 09, 2004 @04:56PM (#10205838)
      In an economics class I took, we were presented with a case where a bunch of missionaries got together for a project where they would collect alot of money, then go to a third world nation and buy some underage prostitutes, then bring them to the states to give them help, treatment, and a caring foster home to be raised up in.

      It all sounds good on paper until you look at the fact that the people that kidnapped the kids got paid, so they have incentive to repeat the process. The argument was that the better (albeit longer and harder) fight was to make child prostitution not profitable or try to arrest or contain the kidnappers somehow.

      Somehow I think the the spammers would figure out a way to get their money, cover their tracks, and sneak away. I don't think they really care what happens to the 20k zombies. They got their money, weather the zombieNet was used to clean house or actually send spam.
    • Oh, that would work, but it would be APPEASING the spammers. Modern government can't open the door of appeasement. No, far better to raid some third world software development house that has nothing to do with spam, kick the shit out the bastards and hope it stands as a warning to everybody else.
  • by Samurai Cat! ( 15315 ) on Thursday September 09, 2004 @04:26PM (#10205423) Homepage
    Just start monitoring for bursts of spam from their clients, and simply *pick up the phone* and *call them.* "Sir, we've detected mass spam coming from your connection. Please clean up your computer. You have one week."
  • by Jaywalk ( 94910 ) * on Thursday September 09, 2004 @04:28PM (#10205445) Homepage
    Breaking into someone else's computer without permission is illegal. A zombie network of 20,000 PCs means that someone has compromised 20,000 computers and, apparently, advertising that fact for personal gain. How hard would it be for a cop to shell out the $2000, then arrest spammer? Of course anyone who has read Sterling's The Hacker Crackdown [mit.edu] realizes just how clueless law enforcement can be with technical issues, but this one looks like a no brainer:
    • The perpetrator (a spammer) is almost universally hated.
    • Spammers do real damage [internetweek.com].
    • They are doing this damage for a pure profit motive.
    • They are operating out in the open, making for an easy arrest.
    So why are these bozos still in business?
    • by LoudMusic ( 199347 ) on Thursday September 09, 2004 @05:08PM (#10206012)
      Breaking into someone else's computer without permission is illegal. A zombie network of 20,000 PCs means that someone has compromised 20,000 computers and, apparently, advertising that fact for personal gain. How hard would it be for a cop to shell out the $2000, then arrest spammer? Of course anyone who has read Sterling's The Hacker Crackdown realizes just how clueless law enforcement can be with technical issues, but this one looks like a no brainer:

      How embarrassing would it be for the police to discover their own machines in the zombie network ...
    • Breaking into someone else's computer without permission is illegal.

      It isn't breaking in if you ask to be let in and they let you in.

  • by bbdd ( 733681 ) on Thursday September 09, 2004 @04:39PM (#10205621)
    ""Consumers should demand what they do of other utilities," says Kip McClanahan, CEO of security firm Tipping Point. "When I pay my water bill, I expect my water to be drinkable out of the tap. Today, when you pay your Internet bill, the data you get is not consumable.""

    how is it my ISP's fault if i am too stupid to secure my own system? it is quotes like this that pass the buck from the end-user/consumer. hey, if you want to drive a car, you need a license. want an internet connection over 56k? make people pass some sort of security review or test.

    (yes, save your breath, i know ISPs can do things to reduce the problems, but it's not their fault in the end that these machines are messed up.)
  • Security Expert? (Score:3, Insightful)

    by tommasz ( 36259 ) on Thursday September 09, 2004 @04:41PM (#10205639)
    I'm sorry, but calling that woman a Security Expert is wrong. She discovered the hard way that not being aware of security was a mistake but all that makes her is a security-aware user. Of course, that implies most computer owners aren't.
  • by OpenSourced ( 323149 ) on Thursday September 09, 2004 @04:46PM (#10205703) Journal
    I mean, it's like "I transfer you 3 grand and then you mail me a password to a controller server", or something like that ? I guess you have to be mighty sure of the delivery of the goods to enter in such deals.

  • by shogarth ( 668598 ) on Thursday September 09, 2004 @05:05PM (#10205963)
    In July, spam made up 94.5% of e-mail traffic, nearly double from a year before, says e-mail management firm MessageLabs.

    Does anyone else wonder where MessageLabs gets their statistics? I can't help but wonder at their methodology (though I suspect rectal extraction). I get daily reports on SpamAssassin and my configured DNS block lists for the servers I manage. Their spam traffic doesn't start to approach 95% of inbound messages. After eliminating all internal email from the statistics, SpamAssassin flags about 20% of incoming email as suspicious and SpamHaus blocks another 10% or so. These are not confidential, hard-to-find addresses. These are university servers where staff and faculty are required to have valid email addresses posted on the department web pages. Any spider worth a damn should have harvested them long ago. I find it very hard to believe that this environment is getting 60% less spam than systems that don't provide a directory of valid addresses.

    Spam is a problem, but it's time journalists (online and otherwise) start taking stats with a grain of salt. Too many organizations are willing to publish questionable numbers in an attempt to sound like they have thoroughly researched the issue.

    Or in the MessageLabs case, to sell a product that will 'solve' the problem.

    • These are university servers where staff and faculty are required to have valid email addresses posted on the department web pages. Any spider worth a damn should have harvested them long ago. I find it very hard to believe that this environment is getting 60% less spam than systems that don't provide a directory of valid addresses.

      Let me guess: .edu? Spammers have long since started washing their lists for .edu, .gov and .mil addresses. I believe many also filter out ccTLDs. You're looking at a skewed s

  • by Anonymous Coward on Thursday September 09, 2004 @05:09PM (#10206030)
    Using simple tools, I have watched the inbound connection attempts made to my personal computer. Many of these attempt simple http style requests on unregistered ports. The requests are in the form: ttp://www.helllllabs.com/cgi-bin/found_one.cgi or something like that.

    Going to the website, I find its one that sells proxies of some form. Gee.

    Now this seems like they are signing their own name to their evil deeds. Could this mean anything other than this company is scanning for proxies and registering them using their own website?
  • Worst quote from TFA (Score:3, Interesting)

    by PitaBred ( 632671 ) <slashdot&pitabred,dyndns,org> on Thursday September 09, 2004 @05:24PM (#10206183) Homepage
    "Consumers should demand what they do of other utilities," says Kip McClanahan, CEO of security firm Tipping Point. "When I pay my water bill, I expect my water to be drinkable out of the tap. Today, when you pay your Internet bill, the data you get is not consumable."

    I only partially agree with this. What should happen is they should sell me access, and I should be able to waive their protections under the promise that I provide my own. I want to run my low-traffic web and email servers from my connection. Most people don't need to. I will take the extra work of securing them in return for being allowed to use them.
    A blanket stop of much of this is all but impossible, though.
  • by the_REAL_sam ( 670858 ) on Thursday September 09, 2004 @05:26PM (#10206205) Journal

    Basically the Undead could have rights too, I suppose.

  • by sdo1 ( 213835 ) on Thursday September 09, 2004 @05:41PM (#10206379) Journal
    From the USA Today article...

    One indication of the going rate for zombie PCs comes from a June 11 posting on SpecialHam.com [specialham.com], an electronic forum for spammers.

    And you guys didn't put that link in the main Slashdot article?!?!?! Oh come on! If there's a site that deserves to be slashdotted, that one must be it.

    -S

  • From the article:
    ----------
    Heather Hall can trace the start of her online banking nightmare to the day she received what she thought was a legitimate e-mail request from Bank of America asking her to click a link to a bank Web page. The 27-year-old health services worker typed in her login, password and account number.

    [deletia]

    Bank of America agreed to reimburse the money stolen from Hall's account, but only after she badgered them. "They wanted me to believe it was my fault," says Hall.
    ----------

    Gee, I hate to break it to you, sweetheart, but it WAS your fault. YOU were the gullible one who clicked on the wrong link and gave thieves your username, password and account number!

    As long as her attitude is prevalent among the majority, the problem of malware will never go away. Not only are these people completely oblivious to the dangers waiting to snare people using Windows PCs, even when something bad befalls them they just flat out refuse to believe it was their fault.

    ~Philly
    • "Gee, I hate to break it to you, sweetheart, but it WAS your fault. YOU were the gullible one who clicked on the wrong link and gave thieves your username, password and account number!"

      WHAT THE HELL???

      It was NOT the woman's fault!

      The fault rest solely with the theif. If somebody steals money from my bank account, it doesn't matter if they got it at gunpoint or with a fraudulent email, it is not my fault, it is not the bank's fault, it is the theif's fault.

      But of course it's so much easier to bl
  • Contact your AGs (Score:3, Insightful)

    by mabu ( 178417 ) * on Thursday September 09, 2004 @06:02PM (#10206588)
    If you all want this stuff stopped, contact your local Attorney General and demand they start prosecuting these cases. The Feds can't do anything if the AGs won't prosecute. Call your AG and tell him you'll make sure he isn't re-elected if he doesn't start prosecuting people for computer tampering.
  • by mwillems ( 266506 ) on Thursday September 09, 2004 @06:03PM (#10206604) Homepage
    "Consumers should demand what they do of other utilities," says Kip McClanahan, CEO of security firm Tipping Point. "When I pay my water bill, I expect my water to be drinkable out of the tap. Today, when you pay your Internet bill, the data you get is not consumable."

    Seems to me this is off the mark, and it typifies what is wrong with our telecom-oriented providers, as they too believe this all too often.

    The provider provides a connection. He does not provide content. ISDN was a gigantic failure because telco's thought they had to provide content, rather than just a reliable connection.

    If I want content, I will buy an AOL subscription. Otherwise, what I expect is not clean water but a reliable liquid movement mechanism. You don't call it a pipe for nothing. The liquid that comes out will be determined by me, not by the provider of pipes!

    MW

  • by str8 ( 28028 ) on Thursday September 09, 2004 @08:21PM (#10207965)
    If it hadn't already been published that the list was available (Like it's still for sale now that it's public knowledge), this would be a perfect opportunity for Comcast etc to reclaim some bandwidth. They could team with the FBI/Scottland Yard/Interpol (who would be very interested in such fraud) then buy the list with something tracable.
    If the deal is a scam, follow the money and bust the crook. If it's real, follow the money and bust the crook then clean up the zombies on your network.
    Basically it's a no lose opportunity.

    Psst... Hey buddy, can you spare a .sig?
  • by dcam ( 615646 ) <david.uberconcept@com> on Thursday September 09, 2004 @09:16PM (#10208377) Homepage
    I'm going to wait til I can get one second hand. It's bound to come down in price to something more like $1000.
  • Comment removed (Score:3, Informative)

    by account_deleted ( 4530225 ) on Friday September 10, 2004 @12:44AM (#10209803)
    Comment removed based on user account deletion

UNIX is hot. It's more than hot. It's steaming. It's quicksilver lightning with a laserbeam kicker. -- Michael Jay Tucker

Working...