Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Botnet Spam

Deconstructing a Pump-and-Dump Spam Botnet 382

Behind the Front writes "eWeek has teamed up with Joe Stewart, a senior security researcher at SecureWorks in Atlanta, to show the inner working of a massive botnet that is responsible for the recent surge of 'pump and dump' spam. It's a detailed picture of how these sleazy operations work and why they're so hard to shut down. Sobering numbers: 70,000 infected machines capable of pumping out a billion messages a day, virtually all of them for penis enlargement and stock scams. Excellent graphics, too, including one chart that shows that Windows XP Service Pack 2 is hosting nearly half the attacked machines."
This discussion has been archived. No new comments can be posted.

Deconstructing a Pump-and-Dump Spam Botnet

Comments Filter:
  • Filter (Score:4, Insightful)

    by insecuritiez ( 606865 ) on Friday November 17, 2006 @11:15AM (#16884074)
    If more ISPs did egress filtering of email this sort of thing would be harder to do.
    • Re:Filter (Score:2, Insightful)

      by DeGem ( 904883 ) on Friday November 17, 2006 @11:18AM (#16884136)
      Your assuming that the spam is comming off a mail server the ISP is controling.
      • Re:Filter (Score:3, Insightful)

        by ILikeRed ( 141848 ) on Friday November 17, 2006 @11:33AM (#16884422) Journal
        No, just block port 25 to all servers other than the ISPs for dynamic IP addresses. If they do not want to use their ISPs mail server, they can purchase a static IP, or set up a proxy with a different port. If you are not capable of doing either of those things, then you should not have the privilege.
        • Re:Filter (Score:5, Insightful)

          by RichMan ( 8097 ) on Friday November 17, 2006 @11:48AM (#16884730)
          > No, just block port 25 to all servers other than the ISPs for dynamic IP addresses.

          I thought I paid for IP access. Deliberate port blocking by my ISP is blocking services I pay for.

          IP access means IP access, it does mean port 80 web surfing only. Any steps toward that are plain wrong.

          I agree it is a wild world out there but it is a problem of weak clients. The service provider should be blind unless a client is affecting network performance beyond their paid for slice. Then the client should be totally blocked.
          • Re:Filter (Score:3, Informative)

            by tinkerghost ( 944862 ) on Friday November 17, 2006 @12:25PM (#16885386) Homepage
            Check your TOS with your ISP again. Many of them have prohibitions against running servers off of your dynamic IP address. Most of that is holdover from having a 'server' defined you as a business user, but it's still there. I know that RCN shut down Port 80 inbound following Code red because there was more virus traffic than actual requests - it's staggering how many people are running IIS without knowing it. At one point they also blocked all port 25 traffic not directed to the official network mail servers [excluding static IP customers]. There were craploads of complaints, but the right to do so was clearly marked in the TOS.
          • Re:Filter (Score:4, Interesting)

            by ZorbaTHut ( 126196 ) on Friday November 17, 2006 @01:35PM (#16886586) Homepage
            My ISP has a web-based configuration utility that allows me to set a server-side firewall to one of several default values. One of their options blocks several commonly-exploitable ports on Windows. I don't use those ports for anything, and I have my own firewall so those ports shouldn't reach my Windows boxes in any way whatsoever, but I set it to block them anyway. (This was the default setting, actually.)

            Something similar would work fine. Block port 25 to SMTP by default and have a web config utility to change it. If you really wanted, you could set it up to email the user if they tried accessing port 25 when it was blocked ("You might be trying to get past this firewall. Or, you might have a virus. Here's how you can find out, and here's how you can disable it if you need . . . ")
            • Re:Filter (Score:5, Funny)

              by jimicus ( 737525 ) on Friday November 17, 2006 @02:26PM (#16887678)
              Something similar would work fine. Block port 25 to SMTP by default and have a web config utility to change it. If you really wanted, you could set it up to email the user if they tried accessing port 25 when it was blocked ("You might be trying to get past this firewall. Or, you might have a virus. Here's how you can find out, and here's how you can disable it if you need . . . ")

              I like that idea. Virus tries sending out 10,000 emails, user gets 10,000 emails saying "You might have a virus....".
        • Re:Filter (Score:4, Insightful)

          by Hognoxious ( 631665 ) on Friday November 17, 2006 @11:57AM (#16884884) Homepage Journal
          If you are not capable of doing either of those things, then you should not have the privilege.
          What if I don't want to go jump through hoops, or pay double for the privelege? What if I want to acess my work mail server from home? Or a clients? Or I just want to access the email that I've been using for years via pop/smtp?

          Are you one of those imbeciles at Belgacom or something? Because they implemented the same cretinous strategy (without any advance warning, I may add) as you're suggesting.
          • by johnw ( 3725 ) on Friday November 17, 2006 @12:17PM (#16885256)
            The problem with this approach seems to be one that could be addressed by separating the two different ways in which SMTP is used.

            1) It's used by MUAs to pass mail to some sort of parent system for delivery.

            2) It's used by MTAs to pass mail around between themselves - typically passing from the originator's MTA to the recipient's MTA.

            If the first function was switched to a different port number (i.e. not 25) and made authenticated, then port 25 could be blocked by default for dial-up-style users without inconveniencing anyone. They would still be able to use any MTA with which they had an arrangement (subscription, work server, etc.) to take their mail for delivery but bots wouldn't be able to spew vast amounts of mail out by direct SMTP connection.

            The distinction is a bit like that between a DNS query sent from a client to a resolving host, and the recursive DNS query sent from the resolving host to its peers in the DNS pool.

            Please think about this before responding with vitriol.

            Cheers,
            John
            • Re:Filter (Score:3, Informative)

              by b0s0z0ku ( 752509 ) on Friday November 17, 2006 @04:17PM (#16889428)
              If the first function was switched to a different port number (i.e. not 25) and made authenticated, then port 25 could be blocked by default for dial-up-style users without inconveniencing anyone.

              It's been done. Port 587 is used for non-secure client-to-server SMTP already. Some ISP's allow port 587 passthrough but block 25. Personally, I think that sucks, and I'll summarily dump any ISP that blocks 25, if only because I need access to port 25 for things like testing clients' servers sometimes.

              -b.

          • by dodobh ( 65811 ) on Friday November 17, 2006 @12:27PM (#16885422) Homepage
            587/tcp is for message submission. 25/tcp is MTA to MTA. Your MUA has no business talking on port 25.
        • Re:Filter (Score:3, Insightful)

          by berzerke ( 319205 ) on Friday November 17, 2006 @01:02PM (#16886038) Homepage

          No, just block port 25 to all servers other than the ISPs for dynamic IP addresses.

          Some ISP's do this. And this is reason I can't set up a SPF record for my domain. All my parents outgoing email would fail and their ISP (AT&T) doesn't publish any SPF records (and what if they change ISP's, something they have been talking about doing). Considering they are on dail-up, buying a static IP is out of the question. Getting AT&T to unblock them is impossible (I've tried).

        • Re:Filter (Score:3, Insightful)

          by jetmarc ( 592741 ) on Friday November 17, 2006 @03:39PM (#16888832)
          > No, just block port 25 to all servers other than the ISPs for
          > dynamic IP addresses. If they do not want to use their ISPs
          > mail server, they can purchase a static IP, or set up a proxy
          > with a different port.

          I did purchase a static IP and pay for it on the monthly bill. Yet half of my outgoing email is still returned as "rejected for possible spam".

          Maybe your provider keeps "static" IPS separate from "dynamic IPs". Mine appearently doesn't (just assigns me one of his IPs as static). Or the RBLs are too ignorant to learn about static and dynamic IP ranges of smaller countries like the one I live in (Spain, Europe).

          So, go ahead and do whatever you want on your own server. But please DO NOT encourage other people to block so-called "dynamic" IPs, because this blocks most non-US static IPs as well.

          I mean, that's like blocking asian senders. Quite efficient, unless you are asian abroad and want read your friends mail.

          Marc
    • by weierstrass ( 669421 ) on Friday November 17, 2006 @11:18AM (#16884138) Homepage Journal
      then they would use the massive botnets of 0wned machines for something else, that probably also wouldn't be conducive to the health and general well-being of the internet...
    • Re:Filter (Score:5, Insightful)

      by jfengel ( 409917 ) on Friday November 17, 2006 @11:19AM (#16884174) Homepage Journal
      I hear that. It just doesn't seem unreasonable to me to cut off a customer who is sending tens of thousands of email per day. Put the very few with a legitimate reason on a white list (after a phone call) and cut the rest off until they clean up their act.

      As Heinlein said, the answer to any question beginning with "Why don't they..." is "money". Presumably the ISPs figure you'll just take your business and your bot-infested computer elsewhere. But maybe if a few major ISPs got together and agreed to all do it, they'd cut off enough spam to make their customer bases happier, and attract back those customers who gave up in frustration.
      • Re:Filter (Score:2, Troll)

        by Hijacked Public ( 999535 ) on Friday November 17, 2006 @11:42AM (#16884584)
        Why does it seem reasonable to you? Why shouldn't I be able to do what I want with the bandwidth I purchased?

        While I think ISPs should be able to do anything they want with the connections they sell, as long as they are up front about the terms, I will gravitate toward the ones who meddle less.
        • Re:Filter (Score:3, Interesting)

          by MobyDisk ( 75490 ) on Friday November 17, 2006 @11:49AM (#16884750) Homepage
          You should, and you can. Just remember that this is all about false positivies and false negatives. Let's say I ran an ISP and I cut-off everyone who sent 10,000 messages or more a day. How many legitimate users would that cut-off? 1%? .01%? .001%? If someone has a legitimate need to send 10k emails then they can give their ISP a call, declare that they have legit reason, and get their service re-enabled. I hate such systems, but if it eliminated 70,000 pwned computers and forced 70 legitimate users to make a phone call, that is a fair trade-off.
          • Re:Filter (Score:3, Interesting)

            by aaronl ( 43811 ) on Friday November 17, 2006 @12:00PM (#16884940) Homepage
            That won't work, for one of two reasons that I can think of off the top of my head. Either you'll get malware that will only spam 9000 messages per day, or you'll get customers that are cut off regularly, get pissed, and change ISPs. If you're unlucky, you'll also get some lawsuits about it, justified or not.

            You're better off trying to force rate limit outgoing email, keep state on your clients, and trying to cut off outgoing SMTP for abusive hosts. However, you would then be monitoring traffic, and that might not work out so well, either.
            • by salec ( 791463 ) on Friday November 17, 2006 @12:31PM (#16885468)
              Either you'll get malware that will only spam 9000 messages per day, or you'll get customers that are cut off regularly, get pissed, and change ISPs. If you're unlucky, you'll also get some lawsuits about it, justified or not.

              Isn't similar approach used to prevent spamming message board and other online communities? Basically there are sensible natural limits for a human-generated messages to be written and sent. Even if bots adapt and start mimicking human behavior, we still get at least a little offload and spammers get to have more work to do and worse statistical odds against them.

              You are right that we can never win completely, but we can make things a little more bearable.
              • Re:Filter (Score:4, Insightful)

                by tha_mink ( 518151 ) on Friday November 17, 2006 @01:29PM (#16886496)
                I think everyone is missing the point here. The problem really isn't spam. It's the fact that there are botnets out there that are 70,000 strong. Thank god they're only sending enlarge-your-penis emails. Instead of spending energy trying to stop the symptom, let's try and stop the disease. Forget the email, let's figure out a way to stop the infections in the first place. Then there's the issue of cutting off the funding. Why not try and stop the funders of spam. I think that BlueSecurity had it completely right. Piss off the people paying the spammers, and you stop the spam. Nobody's going to send spam for fun, and if they did, maybe we wouldn't mind reading them so much. 1. Stop the infections 2. Stop the funders of spam. 3. Profit! It's a simple as that. I hate how people miss the point on this spam stuff. The spam is only the symptom.
    • by davidwr ( 791652 ) on Friday November 17, 2006 @11:36AM (#16884478) Homepage Journal
      If I were running an ISP, I'd have common ports such as IM, file-transfer/ftp/torrent, ssh, 80/443, irc, and many others allowed and all other ports blocked or restricted to certain destinations by default.

      I'd have a web-page for my customers so they can click things such as:

      Outgoing Email:
      [x] web based [turn on port 80/443]
      [x] through remote-login [turn on remote-login ports]
      [x] through us [turn on mail ports, restrict to our servers]
      [ ] through another server: ______ (specify list of outgoing mail servers)
      [ ] through any server
        +-- [x] check here to turn this off after 7 days (recommended)

      x's show defaults.

      Checking the last two would bring up the relevant sections of the AUP/TOS as a reminder of the strict "no spamming" and "we will suspend outgoing mail and charge you cleanup fees if your machine is taken over" clauses.

    • by jandrese ( 485 ) <kensama@vt.edu> on Friday November 17, 2006 @11:43AM (#16884616) Homepage Journal
      While that would work, it is the sledgehammer approach. You're assuming there is no legitimate reason for someone to be sending mail directly from his home account. I think a less obtrusive method would be to monitor outgoing traffic for excessive SMTP (more than 5MB in 30 minutes for 1 full hour perhaps), and if it is detected block off that customer so that all web browser traffic is redirected to the ISPs "your computer is infected, here is how to clean it" page. I think if people were made aware of this sort of thing more often they would become smarter and more careful in the long run.

      If their computer stops sending port 25 mail for 15 minutes (or perhaps they click a button on the webpage saying "I've fixed it"), then they're unblocked until they send excessive mail again. This is more work than the brute force approach of just blocking the port, but I think it is better for the internet in the long run. It also allows people who want to avoid their ISPs dog slow mail server (8-12 hours to process an email?!?) an option.
    • by Chapter80 ( 926879 ) on Friday November 17, 2006 @11:44AM (#16884642)
      Has anyone had any luck with these stock tips? None of them seem to be panning out for me. I wonder if I am not acting fast enough. I've really taken a beating on some of these.

      Fortunately, I should have significantly more money to invest shortly, as soon as I get a rather large sum from a new online friend and business associate and new friend, Mr. Emmanuel Obi from Africa, of all places.

  • by MrSplog ( 956424 ) on Friday November 17, 2006 @11:20AM (#16884178)
    The charts would be a lot more interesting if they had them compared to market share. then you've got to consider that people are more likely to target the biggest market share. i mean, how many virus writers are targeting FDOS?
    • by Overzeetop ( 214511 ) on Friday November 17, 2006 @11:27AM (#16884318) Journal
      Well, 99.95% of the infected machines on the botnet are an identifiable variant of Windows, with 0.05% listed as "other". I'm okay with writing off the 35 machines which are not known Win* variants. It's pretty safe to say that the Windows OS is clearly the problem.
    • by Ilgaz ( 86384 ) on Friday November 17, 2006 @11:27AM (#16884324) Homepage
      I understand what you mean. Check the hacked servers http://www.phishtank.com/ [phishtank.com] , almost all run Apache on Linux. Why? It has bigger marketshare on webservers.

      I think the OS X, Linux, FreeBSD "I am invulnerable because of OS I run, I don't need security updates or basic sense of security" will cause problems soon just like phishing.

      • by MECC ( 8478 ) * on Friday November 17, 2006 @12:21PM (#16885314)
        almost all run Apache on Linux

        Where does phishtank keep stats on webserver used and OS its run on? I didn't see that data anywhere on their site. Are you going to netcraft and looking up all 1,429 online phishing websites? If so, do you have a breakdown by OS and webserver?

        • by Ilgaz ( 86384 ) on Friday November 17, 2006 @12:29PM (#16885454) Homepage
          You can easily figure via the "technology" phishing site uses, almost all are hacked PHP. There are only a couple of ASP technology (windows, small business server etc.) I have come across while verifying others submissions. When they take the page down, you generally see "Apache x.x server on Linux" on 404 messages too.

          In fact, you can freely use their database to do such research yourself, that philosophy of the site make us "work for free" as everything is open and available to public/developers.

          You can verify phishes and you will figure the deal with outdated kernels/php and false sense of security.
  • by Overzeetop ( 214511 ) on Friday November 17, 2006 @11:20AM (#16884186) Journal
    I'm sorry, but the terms "Penis Enlargement" and "Excellent Graphics" were situated a bit too close together in that summary for my liking.
  • by Hoi Polloi ( 522990 ) on Friday November 17, 2006 @11:24AM (#16884276) Journal
    It is time to rebuild the email protocol. It needs to be redesigned to cope with modern systems and security needs. The pain of the transition would be worth it. It is just too easy to spoof header info now.
    • by LordEd ( 840443 ) on Friday November 17, 2006 @11:47AM (#16884716)
      Your post advocates a

      (x) technical ( ) legislative ( ) market-based ( ) vigilante

      approach to fighting spam. Your idea will not work. Here is why it won't work. (One or more of the following may apply to your particular idea, and it may have other flaws which used to vary from state to state before a bad federal law was passed.)

      ( ) Spammers can easily use it to harvest email addresses
      ( ) Mailing lists and other legitimate email uses would be affected
      ( ) No one will be able to find the guy or collect the money
      ( ) It is defenseless against brute force attacks
      ( ) It will stop spam for two weeks and then we'll be stuck with it
      (x) Users of email will not put up with it
      ( ) Microsoft will not put up with it
      ( ) The police will not put up with it
      ( ) Requires too much cooperation from spammers
      ( ) Requires immediate total cooperation from everybody at once
      ( ) Many email users cannot afford to lose business or alienate potential employers
      ( ) Spammers don't care about invalid addresses in their lists
      ( ) Anyone could anonymously destroy anyone else's career or business

      Specifically, your plan fails to account for

      ( ) Laws expressly prohibiting it
      ( ) Lack of centrally controlling authority for email
      ( ) Open relays in foreign countries
      ( ) Ease of searching tiny alphanumeric address space of all email addresses
      ( ) Asshats
      ( ) Jurisdictional problems
      ( ) Unpopularity of weird new taxes
      ( ) Public reluctance to accept weird new forms of money
      (x) Huge existing software investment in SMTP
      ( ) Susceptibility of protocols other than SMTP to attack
      ( ) Willingness of users to install OS patches received by email
      ( ) Armies of worm riddled broadband-connected Windows boxes
      ( ) Eternal arms race involved in all filtering approaches
      ( ) Extreme profitability of spam
      ( ) Joe jobs and/or identity theft
      ( ) Technically illiterate politicians
      ( ) Extreme stupidity on the part of people who do business with spammers
      ( ) Dishonesty on the part of spammers themselves
      ( ) Bandwidth costs that are unaffected by client filtering
      ( ) Outlook

      and the following philosophical objections may also apply:

      (x) Ideas similar to yours are easy to come up with, yet none have ever
      been shown practical
      ( ) Any scheme based on opt-out is unacceptable
      ( ) SMTP headers should not be the subject of legislation
      ( ) Blacklists suck
      ( ) Whitelists suck
      ( ) We should be able to talk about Viagra without being censored
      ( ) Countermeasures should not involve wire fraud or credit card fraud
      ( ) Countermeasures should not involve sabotage of public networks
      ( ) Countermeasures must work if phased in gradually
      ( ) Sending email should be free
      ( ) Why should we have to trust you and your servers?
      ( ) Incompatiblity with open source or open source licenses
      ( ) Feel-good measures do nothing to solve the problem
      ( ) Temporary/one-time email addresses are cumbersome
      ( ) I don't want the government reading my email
      ( ) Killing them that way is not slow and painful enough

      Furthermore, this is what I think about you:

      (x) Sorry dude, but I don't think it would work.
      ( ) This is a stupid idea, and you're a stupid person for suggesting it.
      ( ) Nice try, assh0le! I'm going to find out where you live and burn your
      house down!
    • by growse ( 928427 ) on Friday November 17, 2006 @11:50AM (#16884756) Homepage

      Whilst I agree in spirit, the single problem with email now is that you have no way of knowing if a sender really is who they say they are. I can send an email to you which claims to be from Steve Ballmer and you have no way of knowing 100% if it's real or not.

      I'm not sure how this would be solved with a redesign either. The only way I can think of doing it is to have a mandatory digital signature attached to the email, so you can lookup exactly who signed it and prosecute/disable signature if spam. If someone sends an email with an invalid signature, it gets rejected by the mailserver. Downside is that you need a central body to supply these signatures. Verisign perhaps? This would then mean a charge for anyone who wanted to use email, but that might be a good thing. Once you have an organisation though, you have corruption, and spammers will find a way to infiltrate this.

      There's also the issue of getting serious momentum going. I could set up a company, and broker a deal with Versign or someone to supply and keep a lookup database of digital signatures. A few geeks will sign up and set their mailservers to reject all mail that doesn't come with a valid signature. Thing is, they'd have to get a lot of major e-tailors to sign up to this as well, otherwise every time I buy something from Amazon, and they want to talk to me about it, I'll have no idea.

      Just kicking ideas around. :)

    • by vertinox ( 846076 ) on Friday November 17, 2006 @12:07PM (#16885072)
      It is time to rebuild the email protocol. It needs to be redesigned to cope with modern systems and security needs.

      The main problem is that you would need to get everyone to get on board with it all at once.

      However, I don't see why companies do this internally as it is.

      For internal communication you should be using a secure system and anything external just gets put in a different mailbox or system. Still... Its a great deal of work.
      • by RareButSeriousSideEf ( 968810 ) on Friday November 17, 2006 @04:14PM (#16889380) Homepage Journal
        "The main problem is that you would need to get everyone to get on board with it all at once."

        I think the opposite is true. If people have the option of trying the New, Improved, Secure Email without abandoning their current routine, a gradual transition might have a fighting chance. Lots of people with traditional phones also have SIP and VoIP and such. Heck, with a bit of finesse, new protocol plugins could be integrated into existing mail clients.

        Digital signatures could come in dual-varieties: Authority-issued and self-issued. Clients would only download headers & sigs, then decide what bodies to download via sig policy. By default, a client would accept mail signed with an authority-issued sig automatically, but would accept self-issued ones only if the recipient whitelists the sender. Outbound message bodies from unknown sources (self-issued & not whitelisted) would have to sit on the originating outbound server and wait, pending certificate acceptance. Unknown sources would have low connection quotas; upon a flood of sig packets or a large distribution from an unknown source, intermediate servers would refuse connections from that source pending a positive sig disposition.
    • by Kunta Kinte ( 323399 ) on Friday November 17, 2006 @12:21PM (#16885322) Journal

      It is time to rebuild the email protocol.

      We may have to settle for working on a fix. The industry isn't going to replace such an entrenched protocol easily, even if that may be the best solution.

      A large part of the problem is lack of a good, entrenched E-mail Authenication [wikipedia.org] standard. The IETF's Domain Keys Identified Mail [dkim.org] is working on fixing this, but that will take a while. DKIM is pretty much the standardization of Yahoo's DomainKeys protocol. [yahoo.com]

      My guess, is that we will have to wait at least a year before DKIM comes out with any type of RFC document. At least some of the big players including Yahoo and Google will support this protocol right off the bat. Hence it should have a good chance at solving the current lack of any email authentication.

      Of course we know the spammers will adapt as well...

  • by Anonymous Coward on Friday November 17, 2006 @11:24AM (#16884278)
    Perused the article to know how to find out if my computer is infected or not but couldn't find anything. This is such an important news for Windows users, at least tell something abou thow to verify if a particular windows machine is having this problem.
    • by Ayanami Rei ( 621112 ) * <rayanami AT gmail DOT com> on Friday November 17, 2006 @12:04PM (#16885018) Journal
      ... then you probably are.

      Steps:

      1) Get rid of XP. If you're going to run Windows, then run Server 2003. Try to get your company to pay for it if you can.
      2) Don't disable the "MSIE Enhanced Security Configuration", whatever you do.
      3) Use Firefox or Opera, never use IE, unless absolutely necessary (Windows Update)
      4) Always run as a limited user. Never as a user with Administrator access. Right-click on installers and say "Run as... The Following User: Administrator" to install them.
      5) Get yourself all of the SysInternals tools you can get your hands on. This can help you monitor file, registry and process access to look for unexpected behavior. Always check online to see if something is "normal" though before taking action, you don't want to kill your system accidentally.
      5a) Software that requires administrator privledges to run iss probably not worth using anyway. You can special case essential software by using "Run as..." or by giving your user permissions on key files that it can't access. Use RegMon and FileMon in SysInternals to determine what the application is trying to access and give your user (or the Users group) the appropriate permissions on those files/registry keys.
      6) Don't use software you haven't heard of. Free software is usually okay if it's open source, or you can independantly verify its reputation as safe and without adware or malware. Most $30 and below shareware you find through quick google searches is garbage and usually a malware vector, don't buy it.
      7) Don't use Outlook to open mail. Never open unexpected attachments. Always turn off HTML email support and use plain text viewing instead.
      8) Get a virus scanner. Don't use the home versions of McAfee or Symantec, they're garbage. The Norton PC suites are garbage too. Personally I use Symantec Corporate. You should try AVG, BitDefender, or F-Prot. The free versions are decent.
      9) Install and periodically run SpyBot Search and Destroy.
      10) Don't bother with a 3rd party firewall. Use the builtin windows firewall, or an external device. Learn how to properly use them.
      11) Investigate Windows OneCare offerings. I haven't used them, but I hear they are okay. It's a service though, so pony up the cash.

      This is what you have to do to protect yourself in Windows. It's no wonder people have issues.
    • by Bastian ( 66383 ) on Friday November 17, 2006 @12:04PM (#16885024)
      Get a virus scanner, silly. I believe this trojan is detected by all of them.
  • by zitch ( 1019110 ) on Friday November 17, 2006 @11:26AM (#16884296) Homepage
    And implemented greylisting [wikipedia.org] on it. Cut out almost %100 of the spam I have been receiving (Was up to 50 emails a day, now I think only one has gone through since I installed postgrey on my mail server in 1.5 months!). Unfortunately, this is easy to get around, so it should only be a matter of time till that is worked around and becomes useless in the spam fight. By that time, hopefully another anti-spam method comes up...
    • by Rob T Firefly ( 844560 ) on Friday November 17, 2006 @11:43AM (#16884614) Homepage Journal
      This is the basic problem with any single antispam measure, or really any single computer security measure.

      1. Someone comes up with a defense mechanism that works well.
      2. It works so well that more people use it.
      3. It becomes popular enough for the bad guys to beat, so they do.
      4. The defense becomes useless, forcing someone to come up with a new defense.
      5. Goto 1.
      • by Anonymous Coward on Friday November 17, 2006 @11:58AM (#16884908)

        Except greylisting+dnsblocking, for which there is no defense.

        If everyone greylisted, spamming operations would slow down to a crawl. If the go full speed, then the only sites which will accept their spam (or better, to escape detection, temporarily reject it after DATA) are spamtraps, which means the rest of the world becomes instantly unavailable because of dnsblocking.

        If they have to slow down.. well, we win.

        It's just beautiful.

      • by wawannem ( 591061 ) on Friday November 17, 2006 @12:13PM (#16885180) Homepage
        Well, greylisting is suprisingly more effective than most anti-spam measures if you combine it with a decent rbl. The basic premise is that when a message comes in, the server looks at the sender, recipient, and sending host/server. If this is the first time that the greylisting server has encountered this triplet, it tells the sending server to wait X minutes (where X is most likely 5). There are 3 likely outcomes at this point. First outcome, this is a legitimate message from a legitimate server and the waiting period will be honored, then the message will be delivered appropriately and the greylisting server will mark the triplet as legitimate. The second outcome is that the message is coming from a zombie and it will not honor the waiting period because it isn't a fully implemented SMTP server, thus the message will be dropped. Lastly, it is a well-written spam attempt, but within the five minute waiting period, the sending machine will be blacklisted by the rbl to which you subscribe.

        Although you may be right that the bad guys will eventually beat it, in the meantime, there are significant waiting periods involved which will likely slowdown the penetration of the spam. This penetration rate is what makes spam profitable. It basically forces servers to build up trust between each other similar to how people build trust with each other... i.e. "I've worked with this person before on this project, so I can believe in him/her" or "I've never worked with this person on this project, so I'll treat them with suspicion until he/she has proven her/himself"
    • by caseih ( 160668 ) on Friday November 17, 2006 @11:58AM (#16884900)
      Greylisting is no longer completely effective. Initially when I started it cut down on 100% of the spam, as you said. But now, thanks to this new botnet which does honor RFCs for e-mail, I have enlargement and stock spam coming through just fine after waiting out the delay. I won't disable greylisting though; it still keeps out a lot of spam. I'm just saying greylisting doesn't actually completely work. I agree with another poster who said SMTP is pretty much done. Too many people have ruined it for the rest of us. Time to replace the protocol completely with something less vulnerable to abuse.
  • by Trelane ( 16124 ) on Friday November 17, 2006 @11:27AM (#16884314) Journal
    From the graphs, it's obvious that Linux, BSD, and MacOS lumped together are only 0.05 percent of the desktop market!!
  • C'mon (Score:3, Insightful)

    by Tarlus ( 1000874 ) on Friday November 17, 2006 @11:30AM (#16884364)
    Well of course Windows is going to be in the majority of affected machines... There is a dramatically higher number of people in the world using Windows than any other OS, so... wouldn't it make sense?

    As a proud user of Kubuntu, I can relate to /.'s tendency to point out everything that appears to be wrong with Windows... but come on, isn't it a little much to explicitly point it out in this case?
    • by pedestrian crossing ( 802349 ) on Friday November 17, 2006 @11:40AM (#16884542) Homepage Journal
      Well of course Windows is going to be in the majority of affected machines... There is a dramatically higher number of people in the world using Windows than any other OS, so... wouldn't it make sense?

      As a proud user of Kubuntu, I can relate to /.'s tendency to point out everything that appears to be wrong with Windows... but come on, isn't it a little much to explicitly point it out in this case?

      According to their chart, 99.95% of the systems on the botnet run Windows in some form. Unless all other desktop operating systems only have .05% combined market share, maybe there is a correlation between the security of Windows and the botnet problem.

    • Re:C'mon (Score:4, Insightful)

      by Mark Hood ( 1630 ) on Friday November 17, 2006 @11:44AM (#16884632) Homepage
      Actually, the dig was at Windows XP SP2 in particular - not just Windows generally.

      If these bots have control over 'the most secure Windows yet' [com.com], then that is worthy of note.

      Mark

      PS Yes, I know the link is from 2004 - but they've not released anything since, so it must still be true, right?
      • by InsaneGeek ( 175763 ) <slashdot@insanegeek s . com> on Friday November 17, 2006 @12:04PM (#16885002) Homepage
        I think the problem is that there really is nothing inherrent in Linux, etc that would prevent them from being part of a botnet if I run a trojan. As a Linux user I can open up a port >1024 and my .profile or .xinitrc can run a botnet program without me noticing it. Grandma is just as likely to click on a "run this" spam message on Linux as she is on XP, just right now there are limited number of uninformed Grandma's running Linux so people aren't creating programs for it.

        Probably the bigger reason for this specific case is that the spam-thru trojan doesn't run on anything other than a windows! So the stupid people trying to compare it the infection rate of any other OS is very, very *stupid*.
        • by A.K.A_Magnet ( 860822 ) on Friday November 17, 2006 @12:14PM (#16885188) Homepage
          You're assuming a remote exploit in the web browser or mail client. Currently, your grandma opens an attached file in a mail and gets infected. With GNU/Linux, she would have to set it "executable" before being able to run it. She doesn't know how to do that (hopefully) so she won't get infected.

          Programs should be installed system-wide by an administrator (you?), and from a trusted source (signed apt repositories).

          This is a huge difference with Windows and its security model. By default on Windows, all ".exe/.vbs/etc" files are executable.
    • by mrjb ( 547783 ) on Friday November 17, 2006 @11:46AM (#16884678)
      come on, isn't it a little much to explicitly point it out in this case?
      No :)
  • by Jawood ( 1024129 ) on Friday November 17, 2006 @11:32AM (#16884408) Journal
    work. After all, the folks who are doing the "advertising" must be getting some sort of return.

    Which leads me to wonder about the folks who actually believe that those penis enlargement pills work.

    And as far as the "pump and dump" spam goes, are there folks who beleive those spams? Or are they of the mindset of the "greater sucker"? Meaning, if I buy this stock now, after this spam circulates, there will be others who buy this shit stock and push up the price allowing me to make money.

    Yeah, I know the guy who originates the "buy" recomendation is hoping for everyone to buy the stock, but what makes some of the recipients think they'll make out?

    • by artifex2004 ( 766107 ) on Friday November 17, 2006 @11:53AM (#16884818) Journal
      Yeah, I know the guy who originates the "buy" recomendation is hoping for everyone to buy the stock, but what makes some of the recipients think they'll make out?

      There are plenty of idiots out there with access to both internet and credit cards. Really.
      And a lot of them also think that if someone has your email, they must know you from somewhere.

      When I worked at a brokerage firm, people used to call me and ask for advice (which I couldn't give, not being licensed) on how much to invest in whatever stock they got emailed that day.
  • by zappepcs ( 820751 ) on Friday November 17, 2006 @11:36AM (#16884482) Journal
    But when, if ever, will anyone shut down the MS machine? Never is when. MS is far to invested into large corporations and government institutions to ever have anyone, never mind MS, say, all windows products must be updated or dumped. Its just not going to happen. If you owe the bank $1000 dollars, you are in trouble if you're late on the payments, if you owe the bank $10,000,000,000 dollars and you're late, the bank is in trouble.

    Right now, the later is more the case. If MS had to upgrade or recall all XP products, it would cause a large harm to the economy, not just MS's bottom line. Think of what would have to be spent on the upgrades or change outs?

    Too many people have invested in MS products to just shut it down, and just like England won't wake up one morning and start driving on the right side of the road, MS products will remain in service. (I'm not trying to imply that the left side is the incorrect one, just illustrating the size of the problem)

    Reports like this do seem to show MS in a very bad light, but how it gets fixed will be even more interesting. When government types want to show they are doing something about spam, will they do anything to make MS responsible, or make MS fix it? Probably not, so the real answer to spam, or answers, is to implement measures that do not rely on the end user, or the end user's OS to fix it.

    IMO, This means that ISP's are going to have to sandbox segments of their networks to throttle spam, and that cost will be passed on to consumers, or possibly will be borne by the ISP for bragging rights about having less spam than any other ISP, in much the same way that the Bell companies used to do advertising about what they are spending to improve services for consumers.

    This also leaves me with a suspicion about the marketing team for Vista? How better to fix XP SP2 than to upgrade to Vista?
    • by Pooh22 ( 145970 ) on Friday November 17, 2006 @12:13PM (#16885172)
      The end-users need incentives to not polute the (digital) environment, so sending bills in return for sending spam is helpful.

      In order to make it acceptable, an ISP could start by dealing out points first (adding or subtracting, like traffic violations cause points to be taken off your license in some countries). They could give positive rewards for not sending spam and eventually charge people when they do send spam.

      I don't see any other way, because people just don't learn if it's for free.

      Simon
  • nmap? (Score:2, Interesting)

    by goarilla ( 908067 ) on Friday November 17, 2006 @11:49AM (#16884740)
    I wonder tho how they ... know which os the bots are running?
    i mean i use nmap, and other portscanners myself but the OS detection
    is just a sane guess and far from perfect

    I also wonder what the 0.05 % of other OS'es are because i do think
    this malware is written on the win32 api, so i rather guess these were inconclusive
    OS fingerprinting and/or *Nix systems running a virtual machine or ... wine ...
    if this is possible (i'm not trying to troll here)

    And if this is possible i do want to know what kind of measures the users of these non conclusive
    Os fingerprinting scans used because ... it would stop many script-kiddies from trying to automatic crack your machines, if they can't find which OS you're running ...

    Anyone has some tips about this in particular
    How do i fool commonly used portscanners etc ... in their OS detection ... on Windows and *Nix systems?
    • Re:nmap? (Score:2, Informative)

      by Cruise_WD ( 410599 ) on Friday November 17, 2006 @12:34PM (#16885534) Homepage
      If you RTA, you'll find that they know because the Trojan itself logs which machines it's infecting, presumably because the people behind it like to know what's working and what isn't. Therefore this data is coming straight from the (trojan) horse's mouth...*badum bish*
  • by antifoidulus ( 807088 ) on Friday November 17, 2006 @11:50AM (#16884758) Homepage Journal
    getting. A few weeks back I read an article that stated that some crackers had managed to get into the accounts of some of TD Waterhouse's investment clients. Since most of these accounts were retirement accounts liquidating them and stealing all the assets would have been difficult, required a lot of paperwork, and ran a much higher risk of getting caught. So instead what the attackers did was liquidate all the assets of the victims and then used those assets to buy a bunch of pump and dump stocks(high demand low supply=much higher prices). Pumped the value of the stock up significantly then as the name suggests, dumped it.
    As much as I think they are scum for doing so, you have to admit that was pretty creative....
  • by RingDev ( 879105 ) on Friday November 17, 2006 @11:53AM (#16884820) Homepage Journal
    Do these pump and dump scams even work? If so, by what kind of margins?

    -Rick
  • by Thagg ( 9904 ) <thadbeier@gmail.com> on Friday November 17, 2006 @11:54AM (#16884838) Journal
    This network of some 73,000 machines has to rank as one of, if not the, leading supercomputer in the world. Why aren't they ranked in the Top500 list?

    Thad
  • by AceCaseOR ( 594637 ) on Friday November 17, 2006 @11:58AM (#16884898) Homepage Journal

    I recently helped an elderly neighbor secure her computer (I was paid for this service, and I make sure I do get paid every time I get called over for help) by installing some good firewall and anti-virus programs (as well as setting up Firefox and Thunderbird for their primary browsers. When I ran a virus scan on her computer (I installed AVG, as her McAfee subscription had expired), I found several viruses and malware programs on there, all of which I removed, which came with games she downloaded (stuff like mahjong and solitaire). I regret not writing down what viruses she had gotten infected with, so I could find out what she did.

    I did the same thing on my grandmother's computer as well (when she was alive), and odds are there are a lot of seniors who are online and engage in a lot of bad habits that we know are bad - including running IE with minimal protections, opening strange attachments, and so forth. This is not a new problem, and, frankly, a problem that only education (or getting 75% of seniors to switch to Mac OS or Linux) can fix.
  • by bperkins ( 12056 ) on Friday November 17, 2006 @12:04PM (#16885008) Homepage Journal
    If it were possible to take short positions on these stocks, and people would chort rather than buy the stocks that are pumped, then the financial incentive for the pump and dumpers would go away, as would the spam.

  • by MooseTick ( 895855 ) on Friday November 17, 2006 @12:09PM (#16885100) Homepage
    I don't see why the government doesnt go after companies using spam as a selling technique. They still have to recieve money somehow and that can be traced. If the G would shut a few down and lock a few people up for a deacade then there would be a lot less spamming going on.
    • by oahazmatt ( 868057 ) on Friday November 17, 2006 @12:23PM (#16885350) Journal
      I don't see why the government doesnt go after companies using spam as a selling technique. They still have to recieve money somehow and that can be traced. If the G would shut a few down and lock a few people up for a deacade then there would be a lot less spamming going on.
      Because once we authorize the government (or let them authorize themselves) to keep eyes on botnets, there is a possibility that the government may begin to overextend itself onto the Internet in an unfavorable manor.
  • by jonwil ( 467024 ) on Friday November 17, 2006 @12:18PM (#16885268)
    Email? (in which case why dont more ISPs run good email virus scanners? Is there a free (as in beer) email virus scanner out there for those email server admins who cant afford to buy one? (or are there reasons other than cost as to why email server admins and ISPs and stuff arent routinely scanning email as a matter of couse?)

    Exploits in the OS? (why arent ISPs blocking ports like MS-RPC and MS file sharing (things that shouldnt be going out over the internet anyway) for example)?

    Is there something the SEC can do? (perhaps finding the people who buy the stock, pay the spammers to send the spams, sit back and watch whilst their stock becomes a lot more valuable and then proceed to sell it all. (IANAL or a stockbroker but I dont think you can buy/own stock without at least some way to tell who you are).
    • by cdrguru ( 88047 ) on Friday November 17, 2006 @01:00PM (#16886006) Homepage
      For an ISP of any size mail filtering is a significant problem. You don't just add something onto the mail server farm without taking a pretty severe performance hit. I do not believe there is anything free that can handle a substantial load.

      Another factor is that most of the very cautious folks I deal with have a real simple solution - no attachments, period. ISP's cannot implement something like that. They can block executable attachments, but that isn't really effective any longer. From what I understand most of this doesn't really fall into the "virus" or "worm" category but is instead human-installed. Dumb person clicked on the link or attachment. Blocking all instances of this would be pretty tough without having major impact.

      Why would the SEC care? There is no fraud here. Nobody is getting hurt, except those people buying stock and expecting to make a quick profit. They don't make their quick profit and maybe lose money. If you play with the stock market like that you are going to lose money. Period. It isn't the government's job to keep you from doing stupid things with your money.
  • Subject (Score:4, Insightful)

    by Legion303 ( 97901 ) on Friday November 17, 2006 @12:54PM (#16885886) Homepage
    There's a lot of humor potential in going to a site laced with ads and a list of 30 sponsors to read about spam.
  • by Animats ( 122034 ) on Friday November 17, 2006 @02:02PM (#16887194) Homepage

    Those guys shouldn't be that hard to find with enough law enforcement effort. Get a credit card from a cooperating bank. Put a trace on it. Buy some Viagra from a spam. Watch where the money goes, which is probably some bank in a high-crime country. Visit the bank and talk to them. Threaten to have their abilty to process credit cards cut off. Pry the actual payee out of them. Discover that it's another intermediary and start over.

    This is what we pay the FBI for. This is why the FBI has field offices outside the US. This is why the Financial Crimes Information Network [fincen.gov] exists.

    The FBI's Internet-related criminal enforcement [fbi.gov] unit has gotten soft. They sit up in Baltimore and send out child pornography, then go after the people they've entrapped. The process is even mostly automated [fbi.gov] now. That's an easy way to get their stats up, and fits the Bush administration's "regulate sex, not business" mindset, but doesn't solve crimes that have victims. Something to push on after Jan. 20, when the Democrats take Congress and can start asking hard questions of the executive branch.

I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"

Working...