Language Selection

English French German Italian Portuguese Spanish

Hackers Grow Armies of Zombie PCs

Filed under
Security

Attackers are becoming increasingly aggressive as they look to grow their zombie armies of infected PCs, according to antivirus vendor McAfee. This week, the company reported that the number of systems infected with malicious software that allows the PC to be used for unauthorized purposes jumped by 303 percent during the second quarter of 2005 from the previous quarter.

Whereas high-profile attacks such as the MyDoom worm in 2004 generally left no doubt as to whether the user's system was infected, attackers are now using more subtle techniques, often invisibly seizing control of a machine with tiny programs called "bots" that await instructions from their creators, according to Vincent Gullotto, vice president of McAfee's Anti-virus and Vulnerability Emergency Response Team.

These bots allow the infected machine, sometimes called a "zombie," to be used for a variety of illegal purposes, such as sending spam or participating in a denial of service attack against a Web site, Gullotto says. "You're not hearing about a major outbreak every month, but people are not aware that there has become a much more subversive way that virus writers are spreading around the Internet," he says.

On the Increase

Researchers with Gullotto's team recorded nearly 13,000 cases of attempted bot hijackings, up from about 3000 during the first quarter of 2005. The company also reported that the number of adware and spyware programs was up 12 percent when compared to the first quarter of 2005.

Though McAfee says that all sorts of criminals are now involved in hacking, the company has noticed that money, rather than fame or notoriety, has increasingly been a motivating factor in attacks.

Rather than crashing users' systems or sending out huge quantities of e-mail, attackers are using malicious software such as the Mytob worm to install adware on personal computers. And organized criminals are emerging as a new and increasingly effective source of sophisticated attacks, Gullotto says. "There's a whole new ballgame that's being played."

By Robert McMillan
IDG News Service

More in Tux Machines

In wake of Anonabox, more crowdsourced Tor router projects make their pitch

Last week, Ars reported on the story of Anonabox, an effort by a California developer to create an affordable privacy-protecting device based on the open source OpenWRT wireless router software and the Tor Project’s eponymous Internet traffic encryption and anonymization software. Anonabox was pulled from Kickstarter after accusations that the project misrepresented its product and failed to meet some basic security concerns—though its developers still plan to release their project for sale through their own website. But Anonabox’s brief campaign on Kickstarter has demonstrated demand for a simple, inexpensive way to hide Internet traffic from prying eyes. And there are a number of other projects attempting to do what Anonabox promised. On Kickstarter competitor Indiegogo there’s a project called Invizbox that looks almost identical to Anonabox—except for the approach its team is taking to building and marketing the device. Read more

Debian Now Defaults To Xfce On Non-x86 Desktops

Back in September Debian switched back to the GNOME desktop by default in place of Xfce for the upcoming Debian 8.0 "Jessie" release. However, as of today, the non-x86 versions of Debian have flip-flopped once again back to Xfce. Debian switched back to GNOME in September over reasons dealing with accessibility, systemd integration, and other factors when seeing what was the best fit to be the default for Debian 8 Jessie. However, now for platforms aside from x86 and x86_64, Xfce has returned to the default over poor experiences in using the GNOME Shell. Read more

Phoenix Is Trying To Be An Open Version Of Apple's Swift

Apple unveiled the Swift programming language at this year's WWDC event but sadly it's still not clear whether Apple will "open up" the language to let it appear on non-Apple platforms. Swift is built atop LLVM and designed to be Apple's successor to Objective-C in many regards while suppoorting C/Obj-C/Obj-C++ all within a single program. With non-Apple folks being interested in the language, it didn't take long before an open-source project started up around it. Ind.ie has today announced their Phoenix project that aims to be a free and open version of Apple's Swift programming language. The work is being led by Greg Casamento who is also the leader of GNUStep, the common open-source implementation of Apple's Cocoa frameworks. Read more

Google Chromebook quietly takes aim at the enterprise

Google's Chromebook is a cheap alternative to a more expensive Windows or Mac PC or laptop, but up until recently it lacked any specific administrative oversight tools for enterprise IT. While IT might have liked the price tag, they may have worried about the lack of an integrated tool suite for managing a fleet of Chromebooks. That's changed with release of Chromebook for Work, a new program designed to give IT that control they crave for Chromebooks. Read more