Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Operating Systems Software The Internet Windows Worms

Major Aussie ISP Disconnecting Trojaned PCs 388

daria42 writes "Australia's largest ISP, Telstra BigPond, has started disconnecting customers that it suspects have excess traffic-causing trojans installed on their PCs. The trojans have been flooding BigPond's DNS servers and causing extremely slow DNS requests for around a month now. Despite nightly additions of DNS servers, BigPond appears to be unable to cope with the extra traffic on its network." Note that the article says the disconnections are temporary and accompanied by communication with the affected customers, not just a big yanking-of-carpet.
This discussion has been archived. No new comments can be posted.

Major Aussie ISP Disconnecting Trojaned PCs

Comments Filter:
  • Good. (Score:0, Interesting)

    by Anonymous Coward on Wednesday April 13, 2005 @04:04AM (#12221330)
    Good.
  • by Rixel ( 131146 ) on Wednesday April 13, 2005 @04:09AM (#12221346)
    Burn up the SMTP servers, then take your lumps.

    All responsible ISPs should apply that logic. Too bad money often replaces responsibility so much.
  • Drastic Measures (Score:5, Interesting)

    by onosendai ( 79294 ) <oliyoung.gmail@com> on Wednesday April 13, 2005 @04:09AM (#12221350)
    These are drastic measures, but given the average BigPond user is much less a geek than anyone frequenting these parts, this will probably be the first time that most of these users will know about it, and given BigPond's previous problems with mail-servers, perhaps they're striking before the problem gets too out of hand.

    Although I don't understand the purpose of a trojaned machine repeatedly hitting a DNS server, is this an attempt to cause an overflow and therefore making the DNS server itself vulnerable?
  • Good idea to me (Score:5, Interesting)

    by Rainwulf ( 865585 ) on Wednesday April 13, 2005 @04:11AM (#12221358)
    i think this is a good idea as well. I work in technical support, and the amount of infected machines i have to deal with is just phenomenal. Cutting of the machines access to internet both fixes the problem. The customer goes "WTF" and i say.. yea your machine is infected. Either install nix or go to a computer store. However its open to abuse... define excessive traffic.. and what traffic is malware or legitimate traffic. However... since a good 90 percent of spam comes from infected machines as well (go windows you good thing go) its all thumbs up from me.
  • Waste of time? (Score:5, Interesting)

    by www.sorehands.com ( 142825 ) on Wednesday April 13, 2005 @04:15AM (#12221376) Homepage
    They should at least make a phone call to the party so they don't waste time trying to figure out the problem.

    Not all people pick up the phone and tolerate the script. Some people actually try to diagnose the problem first.


    Most ISPs have language in their terms of service that permits this action. It is a shame that an ISP need to have their services almost knocked out before taking action.

    I'd like to see some ISPs that ignore trojaned machines or support spammers get sued by other customers when their IP blocks end up on block lists.

  • by zimba-tm ( 598761 ) on Wednesday April 13, 2005 @04:28AM (#12221416) Homepage
    Well, there is no need to *disconnect* the computer if all you have to do is block the problematic port. It's so lazy to disconnect a computer. Do they know traffic shaping ?
  • by Anonymous Coward on Wednesday April 13, 2005 @04:29AM (#12221419)
    All of these infected Windows boxes are killing the net. If ISPs would simply yank them as they show signs of infection (trojan, worms, etc) UNTIL the customers can demonstrate that they have taken care of problems, then things would be a lot easier.
  • Nothing new (Score:5, Interesting)

    by Rob Kaper ( 5960 ) on Wednesday April 13, 2005 @04:33AM (#12221433) Homepage
    Dutch ISP Xs4All has been doing this for months/years, blocking all traffic (most notably SMTP) minus SSH and access to their HTTP proxy.
  • by GafferFish ( 852750 ) on Wednesday April 13, 2005 @04:35AM (#12221438)
    Save money? I figure they'll be loosing revenue based on excess data traffic charges generated by extra traffic caused by the trojans. Note to Non-Aussies: BigPond counts both uploads and downloads for data traffic with excess usage charged at A$0.15/mb. There have been cases of people being hit with very large internet bills for one month (IIRC the largest was in excess of $10,000)
  • by aussie_a ( 778472 ) on Wednesday April 13, 2005 @04:35AM (#12221439) Journal
    Lucky they're ringing up the user, because otherwise the user will just assume that they've been disconnected. Yet again. Bigpond is terrible with keeping it's users online (I'm talking broadband here), and believe that two to three disonnects per day is perfectly fine, even when those disconnects last for an hour or more.

    I can see it now:
    Customer: My broadband is down again.
    Bigpond: Oh, I see. Well from time to time this does happen for a brief moment...
    Customer: It's been down all day, and it's happened every day this week.
    Bigpond: I see.. What's your account *clickety* Oh yes, we've marked you as a computer with a trojan. Please do a virus scan and call us back, if it comes back negative we'll re-connect you.

    I'd go with someone else but they're the only broadband provider for my area. And I live in Sydney (the suburbs, an hour from the city itself)
  • suspected PCs? (Score:2, Interesting)

    by Anonymous Coward on Wednesday April 13, 2005 @04:56AM (#12221513)
    Why do they talk about 'likely source' and about cuting off 'suspected PCs'?

    Why not simply do a precise measurement (get the netflow from the router) and take actions based on correct data rather then guessing?

    I for one wouldn't want to be cut off by my ISP because of someone at the ISP is guessing.

  • by KiloByte ( 825081 ) on Wednesday April 13, 2005 @05:01AM (#12221526)
    block problematic port

    It's not that simple. The attack in question was done by a flood of DNS queries -- you're not really going to cut off port 53, as this is pretty much equal to knocking that person off the Net.

    The typical case involves a lot of outgoing connections on port 25 -- you can't really block this as well unless the user in question uses nothing but webmail.

    Traffic shaping won't help a lot, either -- it can protect the server, of course, but won't help the user himself. In this case, it will just make their legitimate use prohibitely slow -- their web browser/whatever will compete with the virus they have over the tiny allotted quota of allowed DNS queries.

    IMO it's much better to just cut them off outright, telling them that the fault is on their side.

    If you want to be nice, you can redirect all their traffic to a web server which gives them a nice idiot-proof message about what they need to do. This is what I've set up for a friend's basement ISP (~30 paying users) -- although in that case, the message was similar to "your payment is due for two months, you didn't heed our reminders".
  • Re:My 1st Thoughts (Score:3, Interesting)

    by Anonymous Coward on Wednesday April 13, 2005 @05:08AM (#12221541)
    "Oh crap, is this the first chink in the armor, ISP's can disconnect people based on their traffic... Virus, Trojan, P2P, Torrent"
    I can agree with you on the first 3 statements, but that last is just crap.
    Why the fuck should an ISP want to disconnect a user because of his P2P or Torrent uses? If the ISP can't cope with the amount of data flowing through, it shouldn't disconnect a user. If I pay for a 2mbit DSL with no limitations to usage, I want a 2mbit DSL with no limitations. My ISP shouldn't fucking cut off my internet access. Besides, P2P and Torrent can actually be used for something useful. The last 10 times I've used bittorrent, it was for downloading WoW updates and Gentoo and Debian ISOs.
    Yes, I know that some people will call me naive, and I DO know that not everyone uses P2P and torrent for these purposes, but that shouldn't change the fact that the ISP shouldn't disconnect a user depending on how he uses his connection as long as he pays for it.
  • by Dulcise ( 840718 ) on Wednesday April 13, 2005 @05:10AM (#12221547)
    I think isp's should do what ntl did during the ms blaster worm out break, which is only allow the user to connect to ether the removal tool or a page that contains a link to it and how to use it. it would take more work, but its better for the customer.
  • by Anonymous Coward on Wednesday April 13, 2005 @05:26AM (#12221597)
    When computers here (utwente.nl) are infected it is usually automatically detected, resulting in every webrequest going to "you're in quarantaine, you can download clean-up tools HERE, and when you're clean send us a message HERE. apart from that you can connect to nothing." If you're interested, it's run by the guys from http://snt.student.utwente.nl
  • Pretty Standard (Score:5, Interesting)

    by jchawk ( 127686 ) on Wednesday April 13, 2005 @05:29AM (#12221610) Homepage Journal
    I'm surprised it's taken them this long. When one of our customers gets infected with a virus / open proxy / etc... We *gasp* pay attention, shutdown their connection and immediately contact them and help them fix the problem.

    It's amazing how quickly you can get your network under control doing this. And 9 times out of 10 the end user is greatful that you were willing to work with them to help them correct the problem.

    Fixing infected machines on your network only makes the network a better place for everyone using it.
  • Breaking news??? (Score:2, Interesting)

    by Eyeball97 ( 816684 ) on Wednesday April 13, 2005 @05:41AM (#12221644)
    We've been doing this since the late 90's, what's "news" here? Customers get contacted in several ways, including personally by telephone. If they don't clean their open proxy/smtp relay/virus/worm after that, they get cut off. There'd be a lot less worms and spam around if all ISPs acted this responsibly, what a shame it's taken these guys until now to catch on.
  • Re:Good idea to me (Score:4, Interesting)

    by asliarun ( 636603 ) on Wednesday April 13, 2005 @05:48AM (#12221660)
    I agree with you. This IS a big problem for ISPs. However, i feel that the solution is not to pass the buck onto the customers. You can't realistically expect Joe SixPack, who doesn't know the difference between the CD tray and a coffee cup holder, to keep his computer up to date with the latest service pack or patch.

    A better alternative for the ISPs, IMHO, would be to start behaving like the network administration team in a big company. Joe Sixpack would be better off if the ISP would install a centrally adminsitered system administration client on his machine that automatically scans and deploys the latest anti-virus program. I know that computer-savvy folks wouldn't like to give this much of control of their PCs to ISPs. However, for Joe, this would be the ideal hassle-free solution. With a proper security policy, privacy concerns would also not be an issue.

    The ISP could also have an opt-out policy that non-clueless people could make use of.

    Does this make sense?
  • by Anonymous Coward on Wednesday April 13, 2005 @05:49AM (#12221663)
    Here's what my ISP (Finnish PHNet) does when they detect a trojaned machine (all URLs you type into the browser give you this page):

    http://img56.echo.cx/my.php?image=phnetspamprotect 13vb.jpg [img56.echo.cx]

    You are also allowed access to another page with more details:

    http://img56.echo.cx/my.php?image=phnetspamprotect 05zy.jpg [img56.echo.cx]
  • Doubt it (Score:1, Interesting)

    by antiphoton ( 821735 ) on Wednesday April 13, 2005 @05:55AM (#12221672)
    As soon as Bigpond starts disconnecting users based on P2P is the day Bigpond loses out on a HUGE customer base, and their already horrible rep will go further down the drain. No, they won't be disconnecting users based on p2p activities until there is some kind of law (AUSTRALIAN law) requiring them to do so.
  • Easy fix (Score:1, Interesting)

    by Anonymous Coward on Wednesday April 13, 2005 @06:45AM (#12221813)
    This is great. Especially since I don't have one of the trogans.

    I've complained repeatedly to telstra about slow DNS servers and they pretended they had never heard of the problem. However, the DNS servers are not the only thing being swamped. It can take over 2 hours to get through to there call centre.

    The fix I used: the Optus DNS. Works well. Maybe telstra should have a chat to optus on how to run an ISP.
  • That's nothing (Score:5, Interesting)

    by themusicgod1 ( 241799 ) <jeffrey.cliff@gmail.TIGERcom minus cat> on Wednesday April 13, 2005 @06:52AM (#12221833) Homepage Journal
    Here at the University of Regina my roommate MachinationX had gotten a virus on his WinXP box (why didn't he have antivirus software?! he's an IT consultant!! but I digress) So our ISP (U of R computing services) not only disconnected him from the network, but refused to let him back on the network unless he agreed to give them his computer and let *them* run an antivirus scan on it , after which it would be returned. I happened to have some of my old backups on his machine at the time, but the point is that our ISP can not only watch your internet traffic(as they have been), but if you "get a virus" they can disconnect you and demand they have access to all your personal files at will.

    Blows my mind.
  • Re:My 1st Thoughts (Score:3, Interesting)

    by jotok ( 728554 ) on Wednesday April 13, 2005 @07:23AM (#12221939)
    It seemed like the customers are being ganked not because there was way too much "legitimate" traffic to handle, but because it was becoming a nuisance. The legitimacy of p2p applications is arguable so long as they have legal uses; the legitimacy of gaobot is not arguable as it has no legal uses on a public network.
  • by SoupIsGood Food ( 1179 ) on Wednesday April 13, 2005 @07:25AM (#12221944)
    The Business Class cablemodem accounts with Cox Communications are cut off if their security systems catch suspicious activity (DDOS packets, worm traffic, etc.) or open relays on your network connection. They're very polite about it, explain the problem and how to get it fixed. Their security department's not open after hours, either, so you're horked if you figure this out after midnight.

    Haven't had to deal with their nice security people myself (No Windows or Linux or Sendmail here!), but I've laughed at colleagues who have. Mostly the same people who believe a $70/month cablemodem or DSL connection can replace their $800/month fiber line for serious webhosting enterprises.

    SoupIsGood Food
  • by Anonymous Coward on Wednesday April 13, 2005 @07:36AM (#12221996)
    I got taken off my Cox connex last year for five days due to a bogus Torrent claim (it was FOSS not Copyright Infringement). Upon investigating the reason I was offline (checked the bills, etc) I decided to call Cox. Sure enough, they d/c'd me. I asked them about this policy, and the rep compared it to a "3 Strikes" policy. Now, I was bummed about being taken offline, and even convionced the rep that I wasn't a pirate and this was a mistake, but after I got back online I stared thinking about this "3 Strikes" thing. I actually agreed with it.
  • What Crap (Score:1, Interesting)

    by Anonymous Coward on Wednesday April 13, 2005 @07:41AM (#12222020)
    I wish timothy would post actual news but anyway...

    Compromised PCs are not the cause of Telstra's problem. Their unscalable DNS server cannot cope with the large amount of subscribers. Telstra will not admit that they failed to plan accordingly, so after adding more DNS servers they blame it on the end user. Same problem happened with email a while ago. It was taking up to 30 days for email to pass through Telstra's servers. They blamed it on a mail based worm and their solution was to install more mail servers by the truckload. They blamed Sun's ONE products and HP servers (HP/UX) also for this incident.
  • Re:My 1st Thoughts (Score:1, Interesting)

    by Anonymous Coward on Wednesday April 13, 2005 @07:44AM (#12222032)
    You're not just naive, you're idealistic and possibly also stupid, but when you grow up you'll realize that "shouldn't" is never the same as "won't".
  • 404 File Not Found? (Score:3, Interesting)

    by bigtallmofo ( 695287 ) on Wednesday April 13, 2005 @08:07AM (#12222131)
    I agree with your post completely, but from TFA:

    Another said: "I am having problems loading Web pages, I get the 404 [page not found] error. I have to retry five to 10 times to get some places."

    I may be daft but I don't understand how a DNS or network capacity problem could cause a web server to respond with an explicit "404 File Not Found" HTML error. I could see a timeout, DNS error, or any number of other errors, but a 404 would mean literally that you contacted the web server, it was unable to find the specific file you requested, and it successfully reported that back to you.

    Hopefully the forum poster that is quoted in the article just thinks every HTML error is a 404.
  • by SatanicPuppy ( 611928 ) <SatanicpuppyNO@SPAMgmail.com> on Wednesday April 13, 2005 @08:41AM (#12222275) Journal
    That would only work if it were easy to figure what was infecting the computer based solely on the traffic it's sending out. It's more complicated that you'd think.

    On the other hand, most people who don't know enough to keep their machines virus/trojan free are probably using the software that nearly every ISP sends out to "help" you connect to their services, which means they should be able to include enough diagnostic tools to be able to tell what's running on the machine.
  • Re:My 1st Thoughts (Score:2, Interesting)

    by cd_serek ( 681446 ) on Wednesday April 13, 2005 @09:27AM (#12222520)
    It sure is about time.

    Just last week, I lodged many many complaints to Telstra Bigpond regarding zombies sending excessive spams to my network. I even went to the trouble of submitting over 400+ zombie IP addresses (dynamic IPs with session times).

    Good to see that they are listening to their complaints hotline for once.
  • Keep it up I'd say. (Score:1, Interesting)

    by ErZo ( 852114 ) on Wednesday April 13, 2005 @12:56PM (#12224494)
    I know an swedish internet provider named Telia, Who also does this. Accept what they do, Is redirect all your HTTP request's to an site with "You've been blocked off." And information about why this have been done. My school mate (An girl :O :P) wanted me to help her out, since they'd got blocked off the internet. I spent 3 hours cleaning off like 30 diffrent kinds of viruses, 5-7 of the same one. 400 spyware, ETC ETC. Well, Atleast I got payed to do it. I like her Dad, coming in.. and he's like.. "oh finaly.. Thanks for helping us out, would you like some payment?" I mean.. Should I say no? Haha :D Hope more of theese ISP's do this. (P.S) By the way, all other port's traffic was disabled. So only traffic on 80 (to their "Your blocked page") was "activated". w00p

I've noticed several design suggestions in your code.

Working...