Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security IT

Australian ISPs Asked To Cut Off Malware-Infected PCs 286

bennyboy64 writes "Australia's Internet Industry Association has put forward a new code of conduct that suggests ISPs contact, and in some cases disconnect, customers that have malware-infected computers. 'Once an ISP has detected a compromised computer or malicious activity on its network, it should take action to address the problem. ISPs should therefore attempt to identify the end user whose computer has been compromised, and contact them to educate them about the problem,' the new code states. The code won't be mandatory, but it's expected the ISP industry will take it up if they are to work with the Australian Government in preventing the many botnets operating in Australia."
This discussion has been archived. No new comments can be posted.

Australian ISPs Asked To Cut Off Malware-Infected PCs

Comments Filter:
  • Reminds me (Score:5, Interesting)

    by Shadikka ( 876072 ) on Tuesday September 15, 2009 @02:19AM (#29422991)
    A couple of years ago, a major ISP in Finland had a somewhat similar system. They wouldn't allow infected computers to take any other network access than HTTP and they redirected all HTTP traffic to a page saying "you're infected" and providing short instructions on how to fix it. It seems that they're not doing it anymore, but I don't know the reason.
  • by Falconpro10k ( 602396 ) <jmark2.gmail@com> on Tuesday September 15, 2009 @02:32AM (#29423045) Homepage
    i always enjoyed seeing those in my snort logs, or even the logs in my pix in later years. And yes, I'd send the sniffer trace to the abuse address of the isp, never made a damn bit of difference. This is what infuriates me about consumer isps. If one of my clients who buys service from me started to get sniffer trace emails to my abuse mailbox, i'd be on the phone at the least.
  • by Dorsai65 ( 804760 ) <dkmerriman.gmail@com> on Tuesday September 15, 2009 @02:41AM (#29423071) Homepage Journal
    True, except for one tiny little detail: all the crap the infected/zombie machines spew out wastes bandwidth on the net and slows things down for the rest of us -- as well as trying to infect other machines. Not to mention the spam, DDoS-ing, and other jackassery going on.
  • by the_raptor ( 652941 ) on Tuesday September 15, 2009 @02:42AM (#29423081)

    My (Australian) ISP has been doing this at least for spam relays for a few years now. If they detect you are being used to spam they cut all your traffic and redirect port 80 to a page telling you what has happened and giving you links to AV tools and an automated traffic checker that will unblock you once you have dealt with the malware. Two of the guys I live with got infected and so I have personal experience dealing with the system. To me it seems like a perfectly sensible and responsible reaction to a serious problem. IMO any ISP not doing this is an irresponsible netizen.

    To me it is like your CC company notifying you of suspicious charges or the phone company asking why your mobile is suddenly making hundreds of calls from Azerbaijan. It not only stops the current problem but if people are actually notified that they have a problem they are far more likely to take steps to protect themselves in the future.

  • by vxvxvxvx ( 745287 ) on Tuesday September 15, 2009 @02:43AM (#29423087)
    I know when I was living on campus at a state university my computer was caught in one of their malware scans. I was running Linux and had firewalled ping requests among other things. Their scanning system automatically assumed if a computer did not respond to ping it was infected.
  • by Okind ( 556066 ) on Tuesday September 15, 2009 @02:52AM (#29423135) Homepage

    It also happens in the Netherlands with XS4All.

    At some point a server at work was hacked. Since I connect to home using an SSH key, my home machine was compromised as well.
    My ISP then sent me an email, and cut off all access except:
    - email (it went via their spam filtering email server)
    - HTTP (if gone through their proxy; otherwise only their website)

    This is a solution that also works for grandma, because she has no clue how to clean their computer, doesn't know how to find someone to pay to do this right, and doesn't want to burden the children with what she percieves to be an unimportant plaything (after all, the postal services still work).

  • Re:About time (Score:4, Interesting)

    by badfish99 ( 826052 ) on Tuesday September 15, 2009 @02:53AM (#29423139)

    Having sold "unlimited" access at a fixed price, ISPs run on tight margins, so one simple email or phone call, plus the subsequent dealing with the customer, will wipe out the whole year's profit from that customer. So what in practice will happen if ISPs go down this route is that they will simply start blocking the ports for IRC and mail. And then the malware will move to another protocol, and that will be blocked, and so on.

    I suspect the the law of unintended consequences will mean that we'll end up with ISPs that provide access only to http and https.

  • Re:Reminds me (Score:5, Interesting)

    by dnaumov ( 453672 ) on Tuesday September 15, 2009 @03:33AM (#29423285)

    A couple of years ago, a major ISP in Finland had a somewhat similar system. They wouldn't allow infected computers to take any other network access than HTTP and they redirected all HTTP traffic to a page saying "you're infected" and providing short instructions on how to fix it. It seems that they're not doing it anymore, but I don't know the reason.

    The largest ISP in Finland, Elisa is still doing it and the system is actually working very well. I haven't seen a single false positive yet (yes I work in their helpdesk).

  • Microsoft's response (Score:5, Interesting)

    by AnalPerfume ( 1356177 ) on Tuesday September 15, 2009 @03:44AM (#29423347)
    EVERY country needs to be doing this, and not making it voluntary either. Any problem on the internet affects everyone connected to it. Cutting off PCs in one country has limited effect in isolation. Considering botnets are an exclusive Windows problem, Microsoft should be forced to pay for the scheme too. It's their mess after all.

    I'm curious about how MS will respond to this if it comes into being. On one hand they'll lose a large number of users, after all, does anyone outside the MS camp really believe that it's not gonna be 100% infected Windows PC's that will be affected? What will MS do?

    Will they offer discounted or free vouchers for repairs, upgrades etc? How many of these machines will be unlicensed? Will they pay to fix unlicensed copies of Windows if the owners either have no money to spend on a sticker with a number on it? In the current economic climate you can't blame them. Is a subsidy to clean the PC worth the ISP's time and hassle knowing it'll be infected again by the end of the week at the latest, and they'll have to repeat the same warning and threat of disconnection all over again. Will they provide paid anti-malware software? Who pays for all of this? Will they provide training for Windows users to at least give them a chance of having a few months online without a letter?

    This would reflect badly on MS in any free press, even having to be the only ones to offer fixes is embarrassing enough. Given that MS control the mainstream media it'll go unnoticed as far as PR is concerned, but it's yet one more thing eating into their profits at a time where they're struggling.

    The alternative is to lose a large number either to Linux, or off the internet altogether. Anyone who's had the internet for a while knows what it's like when it goes down for a few hours, will those people really decide the internet is not worth it?

    I'm guessing the great philanthropists and all round nice people at MS are busy lobbying at every level to stop this from happening or at least water it down (notice the ISPs are being "asked" not "told"). They need to keep market share by any means necessary, ideally without spending a cent on it. The rest of the world can suffer as long as MS's interests are not hurt.

    Given that Windows has all the security of a paper tank in a thunderstorm this will be hilarious to see the workload the scheme entails, and over time the number of Windows PCs in Australia still connected because they're NOT infected. They will drop like flies. Give it a few years and it'll be a Windows free zone.
  • by Gandalf_Greyhame ( 44144 ) on Tuesday September 15, 2009 @04:11AM (#29423429) Journal

    I've contacted ISP's about their customers attempting to "hack me" because they were infested with Code Red and Nimda and for some reason my Apache server on Linux looked incredibly tasty. They of course proceeded to ignore me and not even to contact their customers.

    I had a similar experience at University. I was living on campus and had my Apache server running along nicely on my Linux box, and kept on getting these weird error logs. As soon as I saw it I had a feeling that it was Code Red, so I checked up on the net just to confirm. It was. So I then traced it back to its source - one of the University's own computers. I contacted the Uni's IT staff and informed them that they had a machine that was infected with Code Red. Do you know what response they gave me?

    "It isn't our machine that is infected. Your machine is the infected one."

    For anyone who didn't read the above properly, or can't be bothered going back over it again, I was running Apache on Linux and the Code Red worm infected Microsoft IIS Web Servers.

  • by KenMcM ( 1293074 ) on Tuesday September 15, 2009 @04:14AM (#29423443)
    Exetel also conducted a trial of its own [exetel.com.au] in regard to ISP level web filtering technologies. It made participation in this trial mandatory for all of its subscribers, disallowing them the freedom to opt-out. There's some food for thought.
  • by Horus1664 ( 692411 ) on Tuesday September 15, 2009 @04:20AM (#29423469)

    I'm in the UK and used to use Zen as my ISP. I found their tech support very helpful in spotting dodgy activity emanating from my home network and advising me on ways to investigate and correct my problems. They did warn that I should take immediate action or they would have to consider suspending my connection. I found this a sensible, helpful and mature approach to the situation.

    If done properly involvement of the ISP in identifying and helping resolve infected PCs should be welcomed I would have thought...

  • by digitig ( 1056110 ) on Tuesday September 15, 2009 @04:55AM (#29423615)
    I'm surprised that the ISPs don't do this already. When one of my family members connected an infected PC to my home network my (UK) ISP promptly contacted me to tell me that the network was a source of malware attacks and to sort it or they would disconnect me. For which I was grateful, and I helped the family member resolve the problem.
  • Re:Reminds me (Score:1, Interesting)

    by Anonymous Coward on Tuesday September 15, 2009 @05:15AM (#29423729)

    Really? The web is already overcrowded with bogus sites claiming I am "infected" and this amazing javascript from china will magically cure my PC, give me unlimited free beer and resurrect my late aunt. This is a bad path to follow.

  • by intheshelter ( 906917 ) on Tuesday September 15, 2009 @09:21AM (#29425281)
    As much as I share your enthusiasm for making MS pay for getting people's machines cleaned of malware I think that there is still a gaping hole in social engineering malware (the user is the problem) and the fact that I don't want ANY government to build out a system that can monitor and disconnect users automatically. That is a system just waiting for abuse to jump on board.
  • by YankDownUnder ( 872956 ) on Tuesday September 15, 2009 @03:50PM (#29430253) Homepage
    Does any one that actually lives here in Australia truly believe that, oh, let's say, HELLSTRA, sorry, TELSTRA or Optus is actually going to sacrifice profit in order to stop malware? These folks offshore everything and anything they can to cut costs and increase profits - they structure their support systems as much as possible to deter supporting the end-user. I personally believe that unless the Feds step in and put the hard word on the ISP's, they're going to ignore this as much as possible - or make a show of hitting those using torrents or other file-sharing applications just to "make a show" of it all. IMHO, mind you...

8 Catfish = 1 Octo-puss

Working...