Language Selection

English French German Italian Portuguese Spanish

Hackers Grow Armies of Zombie PCs

Filed under
Security

Attackers are becoming increasingly aggressive as they look to grow their zombie armies of infected PCs, according to antivirus vendor McAfee. This week, the company reported that the number of systems infected with malicious software that allows the PC to be used for unauthorized purposes jumped by 303 percent during the second quarter of 2005 from the previous quarter.

Whereas high-profile attacks such as the MyDoom worm in 2004 generally left no doubt as to whether the user's system was infected, attackers are now using more subtle techniques, often invisibly seizing control of a machine with tiny programs called "bots" that await instructions from their creators, according to Vincent Gullotto, vice president of McAfee's Anti-virus and Vulnerability Emergency Response Team.

These bots allow the infected machine, sometimes called a "zombie," to be used for a variety of illegal purposes, such as sending spam or participating in a denial of service attack against a Web site, Gullotto says. "You're not hearing about a major outbreak every month, but people are not aware that there has become a much more subversive way that virus writers are spreading around the Internet," he says.

On the Increase

Researchers with Gullotto's team recorded nearly 13,000 cases of attempted bot hijackings, up from about 3000 during the first quarter of 2005. The company also reported that the number of adware and spyware programs was up 12 percent when compared to the first quarter of 2005.

Though McAfee says that all sorts of criminals are now involved in hacking, the company has noticed that money, rather than fame or notoriety, has increasingly been a motivating factor in attacks.

Rather than crashing users' systems or sending out huge quantities of e-mail, attackers are using malicious software such as the Mytob worm to install adware on personal computers. And organized criminals are emerging as a new and increasingly effective source of sophisticated attacks, Gullotto says. "There's a whole new ballgame that's being played."

By Robert McMillan
IDG News Service

More in Tux Machines

GNOME Desktop: Flatpak and Random Wallpaper Gnome Extension

  • Flatpak in detail, part 2
    The first post in this series looked at runtimes and extensions. Here, we’ll look at how flatpak keeps the applications and runtimes on your system organized, with installations, repositories, branches, commits and deployments.
  • Flatpak – a history
    I’ve been working on Flatpak for almost 4 years now, and 1.0 is getting closer. I think it might be interesting at this point to take a retrospective look at the history of Flatpak.
  • Random Wallpaper Gnome Extension Changes Your Desktop Background With Images From Various Online Sources
    Random Wallpaper is an extension for Gnome Shell that can automatically fetch wallpapers from a multitude of online sources and set it as your desktop background. The automatic wallpaper changer comes with built-in support for downloading wallpapers from unsplash.com, desktopper.co, wallhaven.cc, as well as support for basic JSON APIs or files. The JSON support is in fact my favorite feature in Random Wallpaper. That's because thanks to it and the examples available on the Random Wallpaper GitHub Wiki, one can easily add Chromecast Images, NASA Picture of the day, Bing Picture of the day, and Google Earth View (Google Earth photos from a selection of around 1500 curated locations) as image sources.

today's howtos

KDE: QtPad, Celebrating 10 Years with KDE, GSoC 2018

  • QtPad - Modern Customizable Sticky Note App for Linux
    In this article, we'll focus on how to install and use QtPad on Ubuntu 18.04. Qtpad is a unique and highly customizable sticky note application written in Qt5 and Python3 tailored for Unix systems.
  • Celebrating 10 Years with KDE
    Of course I am using KDE software much longer. My first Linux distribution, SuSE 6.2 (the precursor to openSUSE), came with KDE 1.1.1 and was already released 19 years ago. But this post is not celebrating the years I am using KDE software. Exactly ten years ago, dear Albert committed my first contribution to KDE. A simple patch for a problem that looked obvious to fix, but waiting for someone to actually do the work. Not really understanding the consequences, it marks the start of my journey within the amazing KDE community.
  • GSoC 2018 – Coding Period (May 28th to June 18th): First Evaluation and Progress with LVM VG
    I got some problems during the last weeks of Google Summer of Code which made me deal with some challenges. One of these challenges was caused by a HD physical problem. I haven’t made a backup of some work and had to rework again in some parts of my code. As I already knew how to proceed, it was faster than the first time. I had to understand how the device loading process is made in Calamares to load a preview of the new LVM VG during its creation in Partition Page. I need to list it as a new storage device in this page and deal with the revert process. I’ve implemented some basic fixes and tried to improve it.

Open Hardware: Good for Your Brand, Good for Your Bottom Line

Chip makers are starting to catch on to the advantages of open, however. SiFive has released an entirely open RISC-V development board. Its campaign on the Crowd Supply crowd-funding website very quickly raised more than $140,000 USD. The board itself is hailed as a game-changer in the world of hardware. Developments like these will ensure that it won't be long before the hardware equivalent of LEGO's bricks will soon be as open as the designs built using them. Read more