Botnets and spyare



“It outta be illegal” is the first thing I usually hear as I start the long process of sanitizing a spyware infested windows machine. The fact is some parts of it ARE, some are just ethically questionable. The area that’s against the law is the part that involves tacking control of someone elses computer without their permission, either manually or in an automated way (exploiting a vulnerability to install a trojan or bot.) Today Brian Krebs is reporting on The connection between botnets and spyware at the securityfix.


Basically, the FBI has charged a 20 year old Los Angeles man with using a virus to infect 400,000 machines and then used that group of machines to install spyware. (Apparently adware networks have distributorship agreements by which an aspiring entreprenour…. or cracker can agree to distribute the adware to broaden the user base.) Some will do this legitimately, but hackers like the young man charged in this break the law by cracking into PC’s to install the adware. Then legit distributor or not, they can get paid for increasing the install base.

Apparently not too long ago 180solutions (in my experience a notorious adware company…) accused 7 distributors of using botnets to install their software in a similar way.

I suspect for some time adware companies have looked the other way on this, being more concerned about how many users they get than how they get them. However, maybe (we can hope) that companies like 180solutions are trying to clean up their image by cracking down on the outright illegal practice of using computer vulnerabilities to install adware.


Related Posts

Blog Traffic Exchange Related Posts
  • Remove Personal Guard 2009 | Personal Guard 2009 Removal Personal Guard 2009 is another rogue antivirus application that is installed through sites that claim your pc is infected with various problems. These online "scans" will encourage you to download personal guard 2009 so that you can clean up your system. Then when Personal Guard 2009 runs it's scan it......
  • How to Remove DefendAPC | DefendAPC Removal Guide DefendAPC is the latest variation on the Wini family of rogue antivirus. It is typically promoted via the use of trojans, malware and aggressive advertising. Once installed on the system it will run supposed scans of the system claiming that you have viruses on your system and that you have......
  • Keyloggers a growing problem It's interesting some years ago when viruses on Windows machines were SOOOO plentiful it seemed like that's all I spent my time cleaning up, I thought... "you know, most viruses are prankster-ish programs. They rearrange icons, maybe cause Windows to crash, or send random files out to others, but they......
Blog Traffic Exchange Related Websites
  • Comparison Between Free Of Charge And Paid Web Comparison between free of charge and paid Web security software has turn into a main subject of discussion amongst probably the most of all computer users recently. Numerous people who have employed both free of charge as well as paid Web security software place their strong opinions. Although many people......
  • Kaspersky Internet Security 2010 Features: Keeps your money and identity safe. Protects against bank account fraud. Safeguards against online shopping threats. Safer Wi-Fi connections. Two way personal firewall. Unique Safe Run Mode for questionable applications and websites. Security Application Monitor to give you full picture on programs installed on your PC. Identity Information......
  • World Wide Web Security Essentials Is Not A Real Spyware Remover. It Resembles The Functions And Looks World wide web Security Essentials is not a real spyware remover. It resembles the functions and looks of genuine spyware removal software but has no capacity to eliminate any virus, trojan or malware. Web Security Essentials is the newest addition to the growing list of rogue Antivirus programs. Internet Security......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

One Response to “Botnets and spyare”

  1. Spyware Informer Says:


    We Were the Victims of __________

    According to 180Solutions, they were victims to some Dutch cybercriminals. In early October, Dutch police arrested three people thought to of using a trojan horse to gain control of over 1.5 million computers. Rumors are saying that they used the tro…


Switch to our mobile site