Botnets and spyare



“It outta be illegal” is the first thing I usually hear as I start the long process of sanitizing a spyware infested windows machine. The fact is some parts of it ARE, some are just ethically questionable. The area that’s against the law is the part that involves tacking control of someone elses computer without their permission, either manually or in an automated way (exploiting a vulnerability to install a trojan or bot.) Today Brian Krebs is reporting on The connection between botnets and spyware at the securityfix.


Basically, the FBI has charged a 20 year old Los Angeles man with using a virus to infect 400,000 machines and then used that group of machines to install spyware. (Apparently adware networks have distributorship agreements by which an aspiring entreprenour…. or cracker can agree to distribute the adware to broaden the user base.) Some will do this legitimately, but hackers like the young man charged in this break the law by cracking into PC’s to install the adware. Then legit distributor or not, they can get paid for increasing the install base.

Apparently not too long ago 180solutions (in my experience a notorious adware company…) accused 7 distributors of using botnets to install their software in a similar way.

I suspect for some time adware companies have looked the other way on this, being more concerned about how many users they get than how they get them. However, maybe (we can hope) that companies like 180solutions are trying to clean up their image by cracking down on the outright illegal practice of using computer vulnerabilities to install adware.


Related Posts

Blog Traffic Exchange Related Posts
  • How to Remove DefendAPC | DefendAPC Removal Guide DefendAPC is the latest variation on the Wini family of rogue antivirus. It is typically promoted via the use of trojans, malware and aggressive advertising. Once installed on the system it will run supposed scans of the system claiming that you have viruses on your system and that you have......
  • Keyloggers a growing problem It's interesting some years ago when viruses on Windows machines were SOOOO plentiful it seemed like that's all I spent my time cleaning up, I thought... "you know, most viruses are prankster-ish programs. They rearrange icons, maybe cause Windows to crash, or send random files out to others, but they......
  • How to Remove System Adware Scanner 2010 | System Adware Scanner 2010 Removal Guide System Adware Scanner 2010 is a new and aggressive rogue antivirus application. Once installed on a system it creates a program that acts as a guard of sorts for it's main process. This guard process is called noterminate and will pop up warnings and encourage users to purchase the rogue......
Blog Traffic Exchange Related Websites
  • Do I Really Need A Completely Free Spyware Removal Program? The need for an effective antispyware program has become an essential component to combat the online threat from adware. The large number of these types of adware software programs is a common pest for everyday people using the internet each day. Just as aeroplanes made the world a smaller place......
  • Kaspersky Internet Security 2010 Features: Keeps your money and identity safe. Protects against bank account fraud. Safeguards against online shopping threats. Safer Wi-Fi connections. Two way personal firewall. Unique Safe Run Mode for questionable applications and websites. Security Application Monitor to give you full picture on programs installed on your PC. Identity Information......
  • Combating Computer Espionage Combating Computer EspionageCombating Computer Espionage In some cases, spies as well as covert operations are found in war grounds or politically tense regions. Now in spite of everything, you can find spies in addition to covert operations running undetected within your personal computer system as you use your computer along......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

One Response to “Botnets and spyare”

  1. Spyware Informer Says:


    We Were the Victims of __________

    According to 180Solutions, they were victims to some Dutch cybercriminals. In early October, Dutch police arrested three people thought to of using a trojan horse to gain control of over 1.5 million computers. Rumors are saying that they used the tro…


Switch to our mobile site