Internet : Things related to the internet

Updated: 6/9/03; 9:41:30 PM.

 

Looking for a Story? Check:
 
 


 
Work:
 

Archives:
 
 
 
 
 

Great Sites:
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 


Subscribe to "Internet" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.

Comments by: YACCS

« chicago blogs »

 

 

Friday, May 02, 2003



Rise of the Spam Zombies

By Kevin Poulsen, SecurityFocus Apr 25 2003 4:45PM

Pressed by increasingly effective anti-spam efforts, senders of unsolicited commercial e-mail are resorting to outright criminality in their efforts to conceal the source of their ill-sent missives, using Trojan horses to turn the computers of innocent netizens into secret spam zombies.

<snip>

One of those programs popped up last week. Named "Proxy-Guzu," when executed by an unwitting user the Trojan listens on a randomly-chosen port and uses its own built-in mail client to dash off a message to a Hotmail account, putting the port number and victim's IP address in the subject line. The spammer takes it from there, routing as much e-mail as he or she likes through the captured computer, knowing that any efforts to trace the source of the spam will end at the victim's Internet address.

Trojan horses generally rely on their wielder's ability to trick innocent people into executing them. Proxy-Guzu, naturally, arrives as spam -- in one sighting the program was offered as a naughty peek at an online webcam.

One early victim of the malware, posting to an anti-virus message board, says he detected it only when his desktop firewall program alerted him to large quantities of outgoing e-mail messages sent to unfamiliar addresses, with subject lines like "Don't tell your parents about this!" and "your bill."

'Untraceable'
Spammers are borrowing the trick from the method electronic vandals use to create computer armies capable of launching distributed denial of service (DDoS) attacks against webservers. What may have been the first Trojan horse custom-tailored for spammers emerged last November: called "Jeem," it grants the perpetrator full access to a victim computer, but also includes a built-in SMTP server to facilitate e-mail laundering.

Arbon says the spam worlds' plunge into adolescent hacking techniques is a result of spammers enjoying fewer and fewer online havens from which to operate. "With the filters and the lists and heurists and all the mechanisms out there people are using, I think the people that are trying to find a way to get the mail delivered are resorting to alternative tactics," she says. "It's untraceable. I hate to put that in print, but it's the truth."

Of course, it also puts the spammers squarely on the wrong side of the law. "As a general rule it's legal to send someone an e-mail even if they don't want it," says Mark Rasch, a former Justice Department computer crime attorney. "But once you break into their computer and get their computer to send e-mail to someone else, then you're violating federal and state computer crime laws."

[Via SecurityFocus



categories: Internet
Other Stories according to Google: SecurityFocus HOME News: Rise of the Spam Zombies | SecurityFocus HOME News: Rise of the Spam Zombies | Computer Cops - Rise of the Spam Zombies - information security - | Mike Cohen's Weblog: Discussion on Rise of the Spam Zombies | Mike Cohen's Weblog: Comment on Rise of the Spam Zombies | DAILY ROTATION | Shuttle SV 25 Mini-Barebones System $195 AMD Athlon XP 2700+ 2.16 | Palm m515 Handheld $219 Microsoft Xbox Video Game System $140 | LinuxSecurity - News | LinuxSecurity - News


12:01:04 AM    


© Copyright 2003 Earl Bockenfeld.



Click here to visit the Radio UserLand website.

 



May 2003
Sun Mon Tue Wed Thu Fri Sat
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Apr   Jun

Story Categories:

Blogging

Body

Digital Media

Heart

Humor

Internet

Microsoft

Mind

Miscelleous

Politics

Outrages

Security

Software

Soul

Userland

Top 10 hits for spyware adware on..
Google
1.Adware , Spyware and Advertising Trojans - Info & Removal ...
2.Spychecker - database of Spyware ( adware ) products lets you ...
3.Spyware Watch (UK) - spyware , adware , stealware - stay aware!!!
4.Spyware Watch (UK) - spyware , adware , stealware - stay aware!!!
5.Spyware Watch (UK) - spyware , adware , stealware - stay aware!!!
6.Spyware Watch (UK) - spyware , adware , stealware - stay aware!!!
7.Spyware Watch (UK) - spyware , adware , stealware - stay aware!!!
8.Spyware Watch (UK) - spyware , adware , stealware - stay aware!!!
9.PC Hell: Spyware and Adware Removal Help
10.Adware and Spyware Information and removal tutorials. Free ...

Help link 6/9/03; 9:40:06 PM.