Botnets and spyare



“It outta be illegal” is the first thing I usually hear as I start the long process of sanitizing a spyware infested windows machine. The fact is some parts of it ARE, some are just ethically questionable. The area that’s against the law is the part that involves tacking control of someone elses computer without their permission, either manually or in an automated way (exploiting a vulnerability to install a trojan or bot.) Today Brian Krebs is reporting on The connection between botnets and spyware at the securityfix.


Basically, the FBI has charged a 20 year old Los Angeles man with using a virus to infect 400,000 machines and then used that group of machines to install spyware. (Apparently adware networks have distributorship agreements by which an aspiring entreprenour…. or cracker can agree to distribute the adware to broaden the user base.) Some will do this legitimately, but hackers like the young man charged in this break the law by cracking into PC’s to install the adware. Then legit distributor or not, they can get paid for increasing the install base.

Apparently not too long ago 180solutions (in my experience a notorious adware company…) accused 7 distributors of using botnets to install their software in a similar way.

I suspect for some time adware companies have looked the other way on this, being more concerned about how many users they get than how they get them. However, maybe (we can hope) that companies like 180solutions are trying to clean up their image by cracking down on the outright illegal practice of using computer vulnerabilities to install adware.


Related Posts

Blog Traffic Exchange Related Posts
  • Remove Personal Guard 2009 | Personal Guard 2009 Removal Personal Guard 2009 is another rogue antivirus application that is installed through sites that claim your pc is infected with various problems. These online "scans" will encourage you to download personal guard 2009 so that you can clean up your system. Then when Personal Guard 2009 runs it's scan it......
  • Cleaning up after WMF Exploit - summary Can I say enough times that after a bad trojan infestation you should format and reinstall? I've cleaned up the infested image that I "sacrificed" to the WMF exploit and as I've said you're pestware install will likely be somewhat different. An exploit is just the road, the spyware and......
  • How to Remove System Adware Scanner 2010 | System Adware Scanner 2010 Removal Guide System Adware Scanner 2010 is a new and aggressive rogue antivirus application. Once installed on a system it creates a program that acts as a guard of sorts for it's main process. This guard process is called noterminate and will pop up warnings and encourage users to purchase the rogue......
Blog Traffic Exchange Related Websites
  • How to Do Home Window Installation Replacing and installing windows can seem like a daunting and expensive task, but it can actually be incredibly simple to do yourself. When you do your own home window installation, you’ll be greatly cutting down on the costs since most of the cost of having windows installed is the labor.......
  • Kaspersky Internet Security 2010 Features: Keeps your money and identity safe. Protects against bank account fraud. Safeguards against online shopping threats. Safer Wi-Fi connections. Two way personal firewall. Unique Safe Run Mode for questionable applications and websites. Security Application Monitor to give you full picture on programs installed on your PC. Identity Information......
  • Combating Computer Espionage Combating Computer EspionageCombating Computer Espionage In some cases, spies as well as covert operations are found in war grounds or politically tense regions. Now in spite of everything, you can find spies in addition to covert operations running undetected within your personal computer system as you use your computer along......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

One Response to “Botnets and spyare”

  1. Spyware Informer Says:


    We Were the Victims of __________

    According to 180Solutions, they were victims to some Dutch cybercriminals. In early October, Dutch police arrested three people thought to of using a trojan horse to gain control of over 1.5 million computers. Rumors are saying that they used the tro…


Switch to our mobile site