Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security The Internet

Zombie Report By ISP 260

twitter writes "Information Week has a summary of a report by Prolexic detailing Zombie activity by ISP, country and population statistics. AOL, the largest provider, had the most zombies but lower rates than others. Fourth largest Earthlink was not in the top 20. The information is gathered from hundreds of customer sites." From the article: "Weinstein went on to say that Prolexic's numbers were actually good news for AOL. 'It's a demonstration that the tools we provide are keeping members safe. Our very aggressive actions -- we provide anti-virus, anti-spyware, and firewall services to our users -- make them measurably safer than those on other ISPs.'"
This discussion has been archived. No new comments can be posted.

Zombie Report By ISP

Comments Filter:
  • Good! (Score:4, Interesting)

    by ajs ( 35943 ) <ajs.ajs@com> on Thursday June 16, 2005 @11:01AM (#12832336) Homepage Journal
    Now, perhaps we can start putting some pressure on the bad ISPs to clean up their networks on the basis of their successful peers.

    I'm really sick of everyone in the world looking down on me as soon as they find that my IP is on a Comcast block.
  • by Anonymous Coward on Thursday June 16, 2005 @11:05AM (#12832372)
    honestly for my purposes i could block anything coming from AOL without affecting any of my servers - do you really want AOLers taking up your bandwith to begin with?
  • by Anonymous Coward on Thursday June 16, 2005 @11:08AM (#12832397)
    End users just *don't care*. This is why there are botnets. Because, although their owned boxen are f-ing with the rest of the internet, it doesn't affect them - a selfish luser attitude, why should they bother virus/trojan scanning their boxen?
    I wish ISPs (victims and hosting) would hold the lusers responsible for this - I think criminal negligence would be an appropriate charge. I for one look after my gentoo linux boxen and keep them patched.
  • Re:Late night TV (Score:3, Interesting)

    by TheClam ( 209230 ) on Thursday June 16, 2005 @11:10AM (#12832416)
    That's just not true. When I moved, I used a free AOL CD just for dial-up, but I never used the email address. When I closed the acct a few months later, I only had 5 emails in the inbox.
  • Re:Good! (Score:1, Interesting)

    by Anonymous Coward on Thursday June 16, 2005 @11:11AM (#12832422)
    But is it really the ISP's responsibility to make sure a given individual keeps their computer up to date? I mean sure, it would be nice, but I'd rather not have them checking that info on me.

    Plus, I'm on a NAT behind a router, so it might be hard for them to scan my computers.

  • File sharing (Score:1, Interesting)

    by Anonymous Coward on Thursday June 16, 2005 @11:39AM (#12832627)
    Perhaps if we can get the zombies to start sharing music and movies we can get the MPAA/RIAA to shut them all down, one lawsuit at a time. :)
  • by GeoffKerr ( 821626 ) <slash@g e o ffkerr.com> on Thursday June 16, 2005 @11:55AM (#12832756)
    The "Average Joe" user isn't able to monitor their own PC for spyware, virus, or bot activity. I worked for my school's student computer repair group and I'd have to say 90% of the issues we had were related to viruses that were passed through AIM and email and spyware choking the systems to a halt. The other 10% were legitimate hardware or software issues (such as Windows imploding on itself or a NIC going bad).

    Our school even gives out "free" (as in hidden in our tuition costs) copies of Norton (really Symantec, but I don't want to give up the old name) AV that takes care of many spyware threats and the vast majority of virus threats. The IT department also highly recommends that students use Spybot S&D or AdAware to remove and prevent spyware from getting a hold of their computers.

    Most students just didn't care enough to worry about using the anti-virus and spyware tools that were provided to them. I've even been told by numerous people that running the tools makes their computers slow and they don't want to have it be slow when they are playing Snood.

    The only way my school was able to successfully fight virus/bot activity on the network and prevent the entire campus from being taken over is to block users with "suspicious" activity (too many emails in a short period of time or too much outbound bandwidth in a short period of time were two tests that I knew of) from using the network until they can demonstrate that their computers are fully repaired.

    The IT department used that technique to successfully stop Blaster and many of the other worms that hit our campus before too many computers were affected. Though it's "rule with an iron fist" at its best, it worked and made the network much safer for the rest of the population.

    Without my school running things like this, it would have just been a matter of time before most of the computers on campus were taken over.
  • by Dachannien ( 617929 ) on Thursday June 16, 2005 @12:14PM (#12832902)
    What is really needed is a system that performs automatic blacklisting based on a report-confirm-block scheme. That is, a customer or a bottom-level ISP becomes the target of a DDoS attack. It reports the IPs of each attacker to its service provider, which reports to its service provider, and so on, up. If an IP address corresponds to an ISP that receives a report, then the ISP examines the traffic originating from that IP address locally (as locally as possible, to distribute the load so no one routing device gets overloaded), determines whether the traffic constitutes participation in a DDoS attack, and if it does, blocks the IP locally.

    Eventually some of the reports will reach backbone providers. At the top, IPs are reported to peers, which then route the reports back down to the local ISPs, who confirm the report and block the IP address locally. The problem then shifts to the end user, who must take responsibility for his or her machine and keep it secure.

    Obviously, compliance is an issue, but this can be solved by having a higher-level provider begin blocking lower level subnets if the lower-level ISP does not comply with the mitigation request.

    This scheme is in every ISP's interest, since backbone providers can reduce traffic and thus costs (carrot incentive) while smaller ISPs must comply or be blacklisted (stick incentive).

    Now all we need is for a smart person to write up an RFC. :)
  • by 99BottlesOfBeerInMyF ( 813746 ) on Thursday June 16, 2005 @12:30PM (#12833014)

    ISPs can already detect incoming DoS attacks and offramp them with existing tools and a few ISPs are now offering automated blocking to their enterprise customers. They can also easily generate a list of zombies in their network. The real problem is notifying infected machine owners and dealing with the customer service aspect costs too much money and is generally not worth the return.

  • Re:A solution (Score:1, Interesting)

    by Anonymous Coward on Thursday June 16, 2005 @12:47PM (#12833171)
    The average computer users are diluting our perfect race! A "final solution" will create a perfect race of users with only blonde hair and blue eyes!

    Seig Heil!
  • by Raistlin77 ( 754120 ) on Thursday June 16, 2005 @01:27PM (#12833668)
    I dunno about other "partners", but anybody who now signs up for AOL Broadband that resides in a BellSouth serviced area does not actually get tunneled directly to AOL's range anymore. AOL actually opens an order with BellSouth to create an account, and BellSouth handles the DSL connection themselves. When these users connect to their AOL accounts, it's no different then installing AOL at your workplace and connecting through TCP/IP. I have a feeling that a decent amount of zombies reported to be of BellSouth origin, or subscribers of other ISPs with whom AOL has similar relationships, may actually be AOL subscribers.

    Another thing that may account for AOL's low zombie percentage is that most brainwashed AOL subscribers don't even know how to use POP clients, since they can't use them with their AOL accounts. I have a feeling that it is extremely hard to get infected by a worm that is sent to your AOL address. Most that are contained in attachments do not make it through AOL's filters, thus the only likely infections were due to idiot users clicking links in the email. And since most are probably not using POP clients, even if they did get infected with a worm, chances are it won't be able to find any address to send itself to since there is no active address book, and no POP accounts setup to use in the first place. The only exceptions to this would be worms that use their own SMTP engine, but they would still be at a loss for address to mail themselves to.
  • Yeah, because no one runs their own mail servers. Wait, I do, and I know many people that have mail and web servers on cable and DSL connections. That's what the Internet is about, you know, being able to connect to other people any way you want.
    That being said, some of the things we do is attempt a tit-for-tat connection to an email server... if someone tries to send us mail, we ask if they accept mail, and if so, there's a good chance that they've got a legit server. That cuts down on a ton of bad connections.
  • by tlambert ( 566799 ) on Thursday June 16, 2005 @02:16PM (#12834219)
    And if you add up the other domains Earthlink owns, it's even higher in the list...

    http://webmail.atl.earthlink.net/wam/supported_dom ains/index.jsp [earthlink.net]

    -- Terry

Our OS who art in CPU, UNIX be thy name. Thy programs run, thy syscalls done, In kernel as it is in user!

Working...