1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Eavesdropping on MS06-40 Controlled Botnet

Discussion in 'Security and Privacy' started by TeMerc, 2006/08/17.

  1. 2006/08/17
    TeMerc

    TeMerc Inactive Alumni Thread Starter

    Joined:
    2006/05/13
    Messages:
    3,226
    Likes Received:
    4
    By Ryan Naraine
    August 17, 2006

    When Joe Stewart spotted a variant of the Mocbot Trojan hijacking unpatched Windows machines for use in IRC-controlled botnets, he immediately went to work trying to pinpoint the motive for the attacks.

    Stewart, a senior security researcher with LURHQ's Threat Intelligence Group, set up a way to silently spy on the botnet's command-and-control infrastructure, and his findings suggest that for-profit spammers are clearly winning the cat-and-mouse game against entrenched anti-virus providers.

    "The lesson here is once you get infected, you are completely under the control of the botmaster. He can put whatever he wants on your machine, and there's no way to be 100 percent sure that the machine is clean," Stewart said in an interview with eWEEK.

    Stewart, a well-respected researcher who specializes in reverse-engineering malware files, echoed a warning issued earlier this year by Microsoft.

    "The only way to be [completely] sure the system is malware-free is to completely wipe the hard drive and reinstall the operating system," he said.

    eWeek
     
  2. 2006/08/18
    Arie

    Arie Administrator Administrator Staff

    Joined:
    2001/12/27
    Messages:
    15,174
    Likes Received:
    412
    Yep, that has always been my view too.
     
    Arie,
    #2

  3. to hide this advert.

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.