Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Internet under attack by zombie computers
UPI ^ | 1/7/07 | Unattributed

Posted on 01/07/2007 6:56:27 PM PST by Huntress

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-89 next last
To: driftdiver
They have plenty of insecurities and havent addressed them.

Running all apps as Admin by default isn't one of them.
61 posted on 01/08/2007 4:01:03 AM PST by dyed_in_the_wool ("O you who believe! do not take the Jews and the Christians for friends" - Koran 5.51)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Sundog
They are protecting Microsoft by putting Linux first, then Mac *then* they get around to mention Microsoft which is merely "more suceptible". Of course, the are to my knowledge *NO* "zombies" (e.g. - remote execution trojans) of the Sub7 type to control Linux. Rootkits are the Linux weakness, not trojans.

UPI, AP, and the MSM is part of the sheep control system, and if the sheep happened to look up, they might rebel and stop paying their taxes and watching the MSM for instructions on what to do...

62 posted on 01/08/2007 4:07:45 AM PST by chilepepper (The map is not the territory -- Alfred Korzybski)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Knitebane
More fundamentally, DOS/Windows was not built from the ground up as a multiuser, networked OS; Unix was.

They had the opportunity to fix that at least three times that they've bragged about. Windows 9x->WindowsNT, WindowsXP and now Vista. Each time they've said it was going to be a complete rewrite. Each time they end up with the same old mistakes.

Oh, no doubt, I'm not letting Microsoft off the hook for that. Sure, there's a lot of legacy stuff to support, but Apple has managed to change processor architectures twice and move to a completely rewritten OS with a pretty smooth transition each time.

63 posted on 01/08/2007 4:10:38 AM PST by ReignOfError
[ Post Reply | Private Reply | To 59 | View Replies]

To: MediaMole
Vista rewrote the TCP/IP from the ground up.

This should worry anyone who knows anything about security. Sure enough, the early versions of Vista fell to the Land attack which has source IP == destination IP. This vulnerability first appeared in Windows 95 over ten years ago.

Sounds like the Vista developers really put at lot of thought into their new TCP/IP stack. Of course, the "thought" was on how to incorporate DRM at the packet level rather than security

64 posted on 01/08/2007 4:15:35 AM PST by chilepepper (The map is not the territory -- Alfred Korzybski)
[ Post Reply | Private Reply | To 53 | View Replies]

To: Cicero
Not a very helpful article. No real details at all.

Well, if they provided any details, people would realize that this article could have been written in the 1980s or 1990s! Anybody remember Michaelangelo?

Mark

65 posted on 01/08/2007 4:19:02 AM PST by MarkL (When Kaylee says "No power in the `verse can stop me," it's cute. When River says it, it's scary!)
[ Post Reply | Private Reply | To 9 | View Replies]

To: driftdiver
There aren't many viruses out there for unix based OS's of which Apple is one. And yes its been out for a while and still have a small fraction the number of users that Microsoft XP has.

"You'd think by now someone would've written a few just for the sake of saying it's possible."

They are out there, just not enough apple users to have them actually spread.

Sorry, but this is FUD. If the mechanisms were out there, it wouldn't take long at all to propagate a worm or virus across the millions of Macs and Linux boxes out there.

 From a previous post of mine:


 

  Yeah, that is something the Microsoft bashers don't realize. If 90% of us used Linux or Apples, then 90% of the viruses and spyware would be made for those systems.

What most Microsoft defenders don't realize is that the above is complete and total hogwash.

 Firefox now has 10% of browser market share. While 10% may not sound like much it represents a huge number of users when you consider the total number of folks on the net. That also doesn't take into consideration that many people fake their browser responses to make it seem as though they are using IE so stupid websites that require IE for no legitimate reason will work.

 Let's take one case in point to show how bogus the concept of "too few users to matter" really is. There are people out there who will write viruses to muck things up just because they can.

Consider the Witty Worm.

From the friendly article:

On Friday March 19, 2004 at approximately 8:45pm PST, an Internet worm began to spread, targeting a buffer overflow vulnerability in several Internet Security Systems (ISS) products, including ISS RealSecure Network, RealSecure Server Sensor, RealSecure Desktop, and BlackICE. The worm takes advantage of a security flaw in these firewall applications that was discovered earlier this month by eEye Digital Security. Once the Witty worm infects a computer, it deletes a randomly chosen section of the hard drive, over time rendering the machine unusable. The worm's payload contained the phrase "(^.^) insert witty message here (^.^)" so it came to be known as the Witty worm.

...

Witty infected only about a tenth as many hosts than the next smallest widespread Internet worm. Where SQL Slammer infected between 75,000 and 100,000 computers, the vulnerable population of the Witty worm was only about 12,000 computers.


Note in the above that the entire population of vulnerable computers was just 12,000, an insignificant number of hosts when you consider how many devices are on the internet.

The Victims:

The vulnerable host population pool for the Witty worm was quite different from that of previous virulent worms. Previous worms have lagged several weeks behind publication of details about the remote-exploit bug, and large portions of the victim populations appeared to not know what software was running on their machines, let alone take steps to make sure that software was up to date with security patches. In contrast, the Witty worm infected a population of hosts that were proactive about security -- they were running firewall software. The Witty worm also started to spread the day after information about the exploit and the software upgrades to fix the bug were available.

O.k., so you have a small pool of vulnerable hosts, and the users at least have the presense of mind to be running a firewall, yet someone took the time to craft and deploy this worm.

Are you sure you still want to claim that there just aren't enough Linux or OSX users out there to make it a tempting target?

That's not even taking psychology into account. There are groups out there who do this kind of thing for fun (and sometimes profit). The bragging rights to having created the first successful OSX worm should be tempting enough if it were as easy a target as MS-Windows apparently is.

66 posted on 01/08/2007 5:56:07 AM PST by zeugma (If the world didn't suck, we'd all fall off.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Common Tator

"Berkley Linux"

No such animal. There is a Berkeley variant of UNIX. BSD.


67 posted on 01/08/2007 5:58:00 AM PST by Sunnyflorida ((Elections Matter)
[ Post Reply | Private Reply | To 19 | View Replies]

To: Huntress

This is absolutely true. The Strategy Pages discusses this occasionally; Zombies are worth about $50/month, each. Various criminal groups, esp. in Eastern Europe, run huge nets of these things and fight for control of machines.


68 posted on 01/08/2007 5:59:03 AM PST by Little Ray
[ Post Reply | Private Reply | To 1 | View Replies]

To: George Smiley
"written any code for VMS boxes?"

Some. More for PDPs.
69 posted on 01/08/2007 6:04:03 AM PST by Sunnyflorida ((Elections Matter)
[ Post Reply | Private Reply | To 21 | View Replies]

To: glorgau; Common Tator

"It turned out Microsoft had purchased the right to use the Berkley Linux code in Windows."

Actually MSFT's UNIX variant was XENIX in cahoots with the original Santa Cruz Operation and it was either System Five of Seven variant.

BSD was a love child of Bekeley students/profs and they went in material numbers to create Solaris.


70 posted on 01/08/2007 6:08:24 AM PST by Sunnyflorida ((Elections Matter)
[ Post Reply | Private Reply | To 37 | View Replies]

To: driftdiver
Sure there are more than 12,000 but them selling that many per quarter doesnt mean there are 25 million in use.

Macs generally have a lifespan longer than PCs. As was said, the last number we know is 19 million on OS X, and over six million have been sold since then. That makes the 25 million number easy, although it could be a bit less as people are replacing their PPC OS X boxes with the Intel Macs. You forget that Apple is winning a lot of converts though. At one point their iMac was the best selling PC in the industry, and now their laptops have a 12% marketshare (ahead of Acer, Toshiba and Lenovo, behind only Dell and HP).

Apples represent a tiny fraction of the PCs sold throughout the world.

A tiny fraction of a really big number results in a big number.

People have written code to attack apples so we know it can be done.

Exploits exist in every OS. The problem is in getting the exploits successful in the wild. That was easy for the old MacOS, which was technologically inferior to even Windows 98. Not so easy for the BSD-based OS X.

Also look for viruses for BSD flavors in the wild, extremely rare. The ones I know of are very old, as in pre-OS X.

71 posted on 01/08/2007 6:21:55 AM PST by antiRepublicrat
[ Post Reply | Private Reply | To 60 | View Replies]

To: dayglored
Mac OS-X is a BSD UNIX variant, which pre-dates Linux by decades.

I dont know if I would call 13 years 'Decades' ;)

72 posted on 01/08/2007 7:48:11 AM PST by N3WBI3 ("Help me out here guys: What do you do with someone who wont put up or shut up?" - N3WBI3)
[ Post Reply | Private Reply | To 33 | View Replies]

To: Common Tator
The functions were the same code, took the same arguments, and were in the same order in the complied code. It turned out Microsoft had purchased the right to use the Berkley Linux code in Windows.

Almost nothing about your post is correct, one does not have to purchase the rights to use BSD *unix* code its implied in the BSD license you can use it any way you want gratis and without the requirement to return code..

73 posted on 01/08/2007 7:53:11 AM PST by N3WBI3 ("Help me out here guys: What do you do with someone who wont put up or shut up?" - N3WBI3)
[ Post Reply | Private Reply | To 19 | View Replies]

To: Anti-Bubba182
I think ISPs are afraid to confront or fix infected user computers.

Well they should be afraid to 'fix them' there are major liabality issues...

74 posted on 01/08/2007 7:54:34 AM PST by N3WBI3 ("Help me out here guys: What do you do with someone who wont put up or shut up?" - N3WBI3)
[ Post Reply | Private Reply | To 42 | View Replies]

To: Huntress
While some zombie computer crimes have been linked to computers running Linux or Macintosh operating systems, officials have warned that Windows systems are the most susceptible.

Ummm....give me ONE example of a Linux or Macintosh computer acting as a "zombie" in this scheme... just one... please.

75 posted on 01/08/2007 7:56:35 AM PST by TheBattman (I've got TWO QUESTIONS for you....)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Sunnyflorida

Actually they created SunOS from BSD, Solaris is System5...


76 posted on 01/08/2007 8:10:05 AM PST by N3WBI3 ("Help me out here guys: What do you do with someone who wont put up or shut up?" - N3WBI3)
[ Post Reply | Private Reply | To 70 | View Replies]

To: driftdiver
"...1.3 million that Quarter. . ." (Apple 10Q for quarter ended September 30, 2006) - Sure there are more than 12,000 but them selling that many per quarter doesnt mean there are 25 million in use.

Do the Math. One Million Macs per quarter cumulative for six years (24 quarters) plus all the candy G3 iMacs and Mac G3s and G4s that were converted to OS X? That could easily reach 25 million OS X Macs. I think with attrition, though, the number is probably closer to 22 million.

People have written code to attack apples so we know it can be done.

Of course people have written code to attack Apples... but then could they get it to spread; did they find a vector other than psychological persuasion (Trojan Horse)? Not so far.

77 posted on 01/08/2007 10:07:04 AM PST by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 60 | View Replies]

To: soupcon

Program 9 from WindowsXP!!!!!!!!



(or is that "ServicPack II: The Vista Strikes Back")


78 posted on 01/08/2007 10:47:13 AM PST by longtermmemmory (VOTE! http://www.senate.gov and http://www.house.gov)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Swordmaker

"Do the Math. One Million Macs per quarter cumulative for six years (24 quarters) plus all the candy G3 iMacs and Mac G3s and G4s that were converted to OS X? That could easily reach 25 million OS X Macs. I think with attrition, though, the number is probably closer to 22 million."

3 million in attrition over 6 years? Not likely

"Of course people have written code to attack Apples... but then could they get it to spread; did they find a vector other than psychological persuasion (Trojan Horse)? Not so far"

The link I posted had one case of 12,000 bad apples in 45 minutes.


79 posted on 01/08/2007 2:58:46 PM PST by driftdiver
[ Post Reply | Private Reply | To 77 | View Replies]

To: N3WBI3

"I dont know if I would call 13 years 'Decades' ;)"

Thats apple years. Ya know kinda like dog years but more trendy.


80 posted on 01/08/2007 2:59:57 PM PST by driftdiver
[ Post Reply | Private Reply | To 72 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-89 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson