Botnets and spyare



“It outta be illegal” is the first thing I usually hear as I start the long process of sanitizing a spyware infested windows machine. The fact is some parts of it ARE, some are just ethically questionable. The area that’s against the law is the part that involves tacking control of someone elses computer without their permission, either manually or in an automated way (exploiting a vulnerability to install a trojan or bot.) Today Brian Krebs is reporting on The connection between botnets and spyware at the securityfix.


Basically, the FBI has charged a 20 year old Los Angeles man with using a virus to infect 400,000 machines and then used that group of machines to install spyware. (Apparently adware networks have distributorship agreements by which an aspiring entreprenour…. or cracker can agree to distribute the adware to broaden the user base.) Some will do this legitimately, but hackers like the young man charged in this break the law by cracking into PC’s to install the adware. Then legit distributor or not, they can get paid for increasing the install base.

Apparently not too long ago 180solutions (in my experience a notorious adware company…) accused 7 distributors of using botnets to install their software in a similar way.

I suspect for some time adware companies have looked the other way on this, being more concerned about how many users they get than how they get them. However, maybe (we can hope) that companies like 180solutions are trying to clean up their image by cracking down on the outright illegal practice of using computer vulnerabilities to install adware.


Related Posts

Blog Traffic Exchange Related Posts
  • Computer security software nets $2.6 Billion over last two years. SecurityFix is talking about the computer security industry. Further, computer users spend $9 billion a year on computers repairs from spyware and antivirus. This reminds me of a recent story of a man that threw out a perfectly good machine because it was infested with spyware. For starters, I do......
  • How to Remove DefendAPC | DefendAPC Removal Guide DefendAPC is the latest variation on the Wini family of rogue antivirus. It is typically promoted via the use of trojans, malware and aggressive advertising. Once installed on the system it will run supposed scans of the system claiming that you have viruses on your system and that you have......
  • How to Remove System Adware Scanner 2010 | System Adware Scanner 2010 Removal Guide System Adware Scanner 2010 is a new and aggressive rogue antivirus application. Once installed on a system it creates a program that acts as a guard of sorts for it's main process. This guard process is called noterminate and will pop up warnings and encourage users to purchase the rogue......
Blog Traffic Exchange Related Websites
  • World Wide Web Security Essentials Is Not A Real Spyware Remover. It Resembles The Functions And Looks World wide web Security Essentials is not a real spyware remover. It resembles the functions and looks of genuine spyware removal software but has no capacity to eliminate any virus, trojan or malware. Web Security Essentials is the newest addition to the growing list of rogue Antivirus programs. Internet Security......
  • Do I Really Need A Completely Free Spyware Removal Program? The need for an effective antispyware program has become an essential component to combat the online threat from adware. The large number of these types of adware software programs is a common pest for everyday people using the internet each day. Just as aeroplanes made the world a smaller place......
  • How to Do Home Window Installation Replacing and installing windows can seem like a daunting and expensive task, but it can actually be incredibly simple to do yourself. When you do your own home window installation, you’ll be greatly cutting down on the costs since most of the cost of having windows installed is the labor.......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

One Response to “Botnets and spyare”

  1. Spyware Informer Says:


    We Were the Victims of __________

    According to 180Solutions, they were victims to some Dutch cybercriminals. In early October, Dutch police arrested three people thought to of using a trojan horse to gain control of over 1.5 million computers. Rumors are saying that they used the tro…


Switch to our mobile site