Botnets and spyare



“It outta be illegal” is the first thing I usually hear as I start the long process of sanitizing a spyware infested windows machine. The fact is some parts of it ARE, some are just ethically questionable. The area that’s against the law is the part that involves tacking control of someone elses computer without their permission, either manually or in an automated way (exploiting a vulnerability to install a trojan or bot.) Today Brian Krebs is reporting on The connection between botnets and spyware at the securityfix.


Basically, the FBI has charged a 20 year old Los Angeles man with using a virus to infect 400,000 machines and then used that group of machines to install spyware. (Apparently adware networks have distributorship agreements by which an aspiring entreprenour…. or cracker can agree to distribute the adware to broaden the user base.) Some will do this legitimately, but hackers like the young man charged in this break the law by cracking into PC’s to install the adware. Then legit distributor or not, they can get paid for increasing the install base.

Apparently not too long ago 180solutions (in my experience a notorious adware company…) accused 7 distributors of using botnets to install their software in a similar way.

I suspect for some time adware companies have looked the other way on this, being more concerned about how many users they get than how they get them. However, maybe (we can hope) that companies like 180solutions are trying to clean up their image by cracking down on the outright illegal practice of using computer vulnerabilities to install adware.


Related Posts

Blog Traffic Exchange Related Posts
  • Remove Personal Guard 2009 | Personal Guard 2009 Removal Personal Guard 2009 is another rogue antivirus application that is installed through sites that claim your pc is infected with various problems. These online "scans" will encourage you to download personal guard 2009 so that you can clean up your system. Then when Personal Guard 2009 runs it's scan it......
  • How to Remove DefendAPC | DefendAPC Removal Guide DefendAPC is the latest variation on the Wini family of rogue antivirus. It is typically promoted via the use of trojans, malware and aggressive advertising. Once installed on the system it will run supposed scans of the system claiming that you have viruses on your system and that you have......
  • Computer security software nets $2.6 Billion over last two years. SecurityFix is talking about the computer security industry. Further, computer users spend $9 billion a year on computers repairs from spyware and antivirus. This reminds me of a recent story of a man that threw out a perfectly good machine because it was infested with spyware. For starters, I do......
Blog Traffic Exchange Related Websites
  • Do I Really Need A Completely Free Spyware Removal Program? The need for an effective antispyware program has become an essential component to combat the online threat from adware. The large number of these types of adware software programs is a common pest for everyday people using the internet each day. Just as aeroplanes made the world a smaller place......
  • Combating Computer Espionage Combating Computer EspionageCombating Computer Espionage In some cases, spies as well as covert operations are found in war grounds or politically tense regions. Now in spite of everything, you can find spies in addition to covert operations running undetected within your personal computer system as you use your computer along......
  • Remove Spyware: Make your Pc Clean and Safe To find out how effectively you can remove Spyware from your system read it. Spyware are some malicious programs that get installed in your computer through Internet with the help of free offered utility software. These Spyware or the Adware as usually known, install with or without users consent and......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

One Response to “Botnets and spyare”

  1. Spyware Informer Says:


    We Were the Victims of __________

    According to 180Solutions, they were victims to some Dutch cybercriminals. In early October, Dutch police arrested three people thought to of using a trojan horse to gain control of over 1.5 million computers. Rumors are saying that they used the tro…


Switch to our mobile site