Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Internet under attack by zombie computers
UPI ^ | 1/7/07 | Unattributed

Posted on 01/07/2007 6:56:27 PM PST by Huntress

NEW YORK, Jan. 7 (UPI) -- Computer code writers in Europe are the chief suspects in the creation of programs that turn other computers into zombie-like slaves for Internet crimes.

Computer experts in Eastern Europe and elsewhere are likely behind the newest computer crime plaguing the Internet, which has turned innocent users into unwitting participants and left security experts stumped, The New York Times reported.

By inserting small programs into others computers, electronic criminals can harness the collective power of multiple computers to commit more elaborate online crimes.

"It's the perfect crime, both low-risk and high-profit," computer security researcher Gadi Evron said. "The war to make the Internet safe was lost long ago, and we need to figure out what to do now."

While some zombie computer crimes have been linked to computers running Linux or Macintosh operating systems, officials have warned that Windows systems are the most susceptible.

Security experts have been unable to defend against such crimes, but some products and services are available to improve online security, the newspaper said.


TOPICS:
KEYWORDS: lowqualitycrap; malware; zombiecomputers
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-8081-89 next last
This sounds like the plot of a latter day Ed Wood movie.
1 posted on 01/07/2007 6:56:28 PM PST by Huntress
[ Post Reply | Private Reply | View Replies]

To: Huntress

Is UPI trying to say that Sub7 and programs like it are something new?


2 posted on 01/07/2007 6:59:15 PM PST by Jeff Chandler (Barack Saddam Hussein Obama)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Gotta love those 'owned' Windows machines.


3 posted on 01/07/2007 7:01:21 PM PST by KoRn
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

How is it they cite Macintosh among the target computers? Have you heard of this?


4 posted on 01/07/2007 7:01:24 PM PST by Sundog (Time flies like an arrow. Fruit flies like a banana. Go Parse.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Huntress

"This sounds like the plot of a latter day Ed Wood movie."

Plan 0 From Cyberspace....right?


5 posted on 01/07/2007 7:03:52 PM PST by soupcon
[ Post Reply | Private Reply | To 1 | View Replies]

To: Huntress
No firewalls, people opening strange email extensions, etc.

I don't think things get better until software gets better on the net side. People on average will not protect theselves.

6 posted on 01/07/2007 7:04:59 PM PST by Anti-Bubba182
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
For reasons only Mac users know, this almost deserves a ping.
7 posted on 01/07/2007 7:05:28 PM PST by SteveMcKing
[ Post Reply | Private Reply | To 1 | View Replies]

To: KoRn

"Gotta love those 'owned' Windows machines."

As apple gets a little more popular you will see more viruses targeting them. They have plenty of insecurities and havent addressed them.


8 posted on 01/07/2007 7:07:54 PM PST by driftdiver
[ Post Reply | Private Reply | To 3 | View Replies]

To: Huntress

Not a very helpful article. No real details at all.


9 posted on 01/07/2007 7:09:08 PM PST by Cicero (Marcus Tullius)
[ Post Reply | Private Reply | To 1 | View Replies]

To: driftdiver

Viruses and security vulnerabilities are two different beasts.


10 posted on 01/07/2007 7:12:07 PM PST by Terpfen ("Conservatives" who sat at home cost us the War on Terror, SCOTUS, and economic success.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Huntress

This is not really new. What is new revolves around the higher number of home computers connected to broadband. The worst offenders are those who connect their computer directly to the DSL or cable modem. These folks are putting a routable (visible) IP address right out there, and without some really strong firewall action, the computer is much easier to compromise.

A consumer grade router (linksys, dlink, etc) placed between the modem and the computer, with the default settings on the router changed is a good first step in combatting this. Additionally, most broadband providers offer a security suite with antivirus and firewall protection. This is a good thing.

Windows is susceptable because it is "feature rich," there is so many boxes out there runnig the OS, and so many folks running it stock.


11 posted on 01/07/2007 7:13:40 PM PST by petro45acp (SUPPORT/BE YOUR LOCAL SHEEPDOG! "On Sheep, Wolves, and Sheepdogs" By David Grossman)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Terpfen

"Viruses and security vulnerabilities are two different beasts."

Sure they are, doesn't change my point.


12 posted on 01/07/2007 7:14:02 PM PST by driftdiver
[ Post Reply | Private Reply | To 10 | View Replies]

To: driftdiver

It does when you consider there aren't many, if any, viruses for OS X. The thing's been out for, what, six years? You'd think by now someone would've written a few just for the sake of saying it's possible.


13 posted on 01/07/2007 7:16:22 PM PST by Terpfen ("Conservatives" who sat at home cost us the War on Terror, SCOTUS, and economic success.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Terpfen

"It does when you consider there aren't many, if any, viruses for OS X. The thing's been out for, what, six years?"

There aren't many viruses out there for unix based OS's of which Apple is one. And yes its been out for a while and still have a small fraction the number of users that Microsoft XP has.

"You'd think by now someone would've written a few just for the sake of saying it's possible."

They are out there, just not enough apple users to have them actually spread.


14 posted on 01/07/2007 7:20:03 PM PST by driftdiver
[ Post Reply | Private Reply | To 13 | View Replies]

To: driftdiver
"As apple gets a little more popular you will see more viruses targeting them."

That may be, but the biggest security hole of most systems is the people who are managing them, or lack thereof.

15 posted on 01/07/2007 7:20:36 PM PST by KoRn
[ Post Reply | Private Reply | To 8 | View Replies]

To: Huntress

Doesn't everybody pretty much know this? Talk about a non-story.


16 posted on 01/07/2007 7:23:48 PM PST by Mad_Tom_Rackham (Well, it's 2007. Time to get ready for 2008.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: driftdiver

25 million machines running OS X isn't enough to tempt a virus writer to at least try? If you say so.


17 posted on 01/07/2007 7:24:07 PM PST by Terpfen ("Conservatives" who sat at home cost us the War on Terror, SCOTUS, and economic success.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Jeff Chandler
UPI parroting the unreliable NYT. It's the end of the world, we're all gonna die!
18 posted on 01/07/2007 7:28:47 PM PST by Abcdefg
[ Post Reply | Private Reply | To 2 | View Replies]

To: Sundog
How is it they cite Macintosh among the target computers? Have you heard of this?

A few years ago I wrote several Internet components for Borland's compliers. Delphi is their Windows complier and Kylix is their Linux compiler.

The current Mac operating system is a version of Berkley Linux. It uses the standard Linux code to access the Internet.

It was easy to learn how Linux accesses the 'net. I just down loaded the open source Berkley Code and read it.

But windows is not open source.. I was faced with the problem of how to reverse engineer Windows Internet access code. By regular means that would take a lot of time and effort. What I decided to do first was try the Linux code compiled for Windows to see what happened. I did it on a whim. I did not really think it would work.

To my surprise it turned out the only difference between the Linux code and the Windows code was the Linux module contained the data structure used while the Windows code required the address of the data structure be passed to the Internet access code. The functions were the same code, took the same arguments, and were in the same order in the complied code. It turned out Microsoft had purchased the right to use the Berkley Linux code in Windows.

Both Delphi and Kylix use the same code for internet access components. The only difference is in Kylix the code passes the data to the functions and Delphi only passes the address of the data.

Thus the bugs that allow unauthorized Internet access to Windows machines will also allow unauthorizede access to the Mac and Linux machines.

But Macs and Linux have only a small percentage of the market. Macs have less than 3 percent. So hackers have had little reason to attack Macs or Linux machines.

Recently, as windows has become more robust and Microsoft has fixed more and more bugs, there have been successful attacks on both Mac and Linux machines.

Macs and Linux machines are not superior. There are so few Mac and Linux machines that few hackers have bothered to attack them.

That is likely to change in the future.

19 posted on 01/07/2007 7:28:51 PM PST by Common Tator
[ Post Reply | Private Reply | To 4 | View Replies]

To: Terpfen

"25 million machines running OS X isn't enough to tempt a virus writer to at least try? If you say so"

Source for that number?

According to this story the number is in the thousands ( 12,000 )
http://www.bynkii.com/archives/2004/09/on_why_the_macs_small_populati.html


20 posted on 01/07/2007 7:33:02 PM PST by driftdiver
[ Post Reply | Private Reply | To 17 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-8081-89 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson