Mary Landesman

Trojans have the same right on the system as does the logged in user. In other words, if the user can, the Trojan can. This includes deleting or modifying files, installing other software, uninstalling software, or sending sensitive password and login information to a remote attacker.
Regardless of how the infection gets on the system, once installed, the system is under the control of the attacker. Often, the attacker will share the list of zombied systems with others, giving unfettered access to their collection of zombie machines by other ill-intended criminals. Attackers can also often simply scan for compromised machines, which often send a greeting of readiness to listening ears. Collectively, the zombied systems are referred to as a botnet.
These botnets are then used for a variety of criminal purposes – all of which pose serious risk to the infected user as well as the entire Internet community.

3 thoughts on “Mary Landesman

  1. shinichi Post author

    Haunting Thought: Is Your PC a Zombie?

    by Mary Landesman

    http://antivirus.about.com/od/whatisavirus/a/zombiepc.htm

    In The Night of the Living Dead, zombies sucked brain matter in a frenzied hunger. In the computer world, a Trojan can be used to turn your PC into its own computing matter – turning it into a zombie machine. Once under the control of such an illicit program, the Trojan can be accessed by attackers intent on any number of ominous deeds.

    Trojans have the same right on the system as does the logged in user. In other words, if the user can, the Trojan can. This includes deleting or modifying files, installing other software, uninstalling software, or sending sensitive password and login information to a remote attacker.

    Computers affected by Trojans can be used to launch attacks against targeted Internet sites. By having thousands of computers accessing the same site at the same moment, the site servers can sometimes become overwhelmed and may no longer be able to process requests. These attacks, referred to as Distributed Denial of Service, or DDoS, attacks, are fairly common.

    Creating a botnet

    Just how do Trojans get on the system? Many are sent via email attachment, masquerading as a legitimate piece of software. When the user executes the attachment, the Trojan installs itself to their system. In most cases, there is no indication this has occurred, and the user innocently plays the game before sending it on to the next victim. While email attachments may be the most common, there are dozens of others ruses used. One of the biggest risks, far outweighing that of email attachments, are files downloaded via anonymous P2P filesharing networks.

    Regardless of how the infection gets on the system, once installed, the system is under the control of the attacker. Often, the attacker will share the list of zombied systems with others, giving unfettered access to their collection of zombie machines by other ill-intended criminals. Attackers can also often simply scan for compromised machines, which often send a greeting of readiness to listening ears. Collectively, the zombied systems are referred to as a botnet.

    These botnets are then used for a variety of criminal purposes – all of which pose serious risk to the infected user as well as the entire Internet community. And while some may not care about the risk to the Internet as a whole, remember that many of today’s threats include keylogging capabilities. Of special interest to the attackers are any personal financial details – which are then used for everything from credit card theft to outright identity theft. In short, it’s not just your computer at risk – it’s your wallet.

    While it may be tempting to think it cannot happen to you, think again. Malicious code has evolved far beyond the childish pranks of yesteryear. Today’s attackers are serious criminals, in it for the money, and they need as many systems under their control as they can get. If your computer isn’t properly protected, it’s not a matter of whether it’s part of a botnet inasmuch as it’s a matter of how long and how bad.

    While broadband users are the favorite targets, even dial-up users can be unwitting participants. Various studies have demonstrated that any vulnerable system can be compromised within as little as 5 minutes online.

    Protecting against Trojans

    PREVENTION is the key. Don’t open unanticipated file attachments from unknown sources. If you know the source, double check with them and make sure they intended to send it. Ask them exactly what it is and why you need it. If it is a game or frivilous application, delete it. Save any attachment you have a need to open and scan it with an up-to-date antivirus scanner before you launch it.

    FIREWALL your system. Antivirus software is a must, but it is simply not enough. Whether you connect via dial-up, cable, satellite or DSL, and regardless of your ISP, get and use a personal firewall.

    Reply
  2. shinichi Post author

    迷惑メールが減らない3つの理由

    by 水谷哲也

    http://allabout.co.jp/gm/gc/296890/2/

    2007年1月、中国に置いた128台のパソコンから、約54億通の出会い系サイトの迷惑メールを送っていた日本人が逮捕されました。この場合は自ら送信していた例ですが、多くは迷惑メール送信の代行業者を使っています。

    代行業者の中にはゾンビパソコンを操って多量の迷惑メールを送る事業者がいます。ゾンビパソコンというのはセキュリティの甘いパソコンをウイルスに感染させ、遠隔操作ができるソフトが仕掛けられたパソコンのことを言います。外部から操ることができるのでゾンビパソコンと呼ばれています。使っている本人は操られていることに気がついていませんし、加害者になっていることも分かりません。

    ゾンビパソコンを迷惑メールの送信元にしたり、他のコンピュータを攻撃する時の踏み台にします。ゾンビパソコンからさらに別のパソコンへウイルスを送り込むことで、新しいゾンビパソコンをどんどん増やしていきます。

    中には150万台ものゾンビパソコンを操っている場合があります。遠隔操作できる攻撃用プログラムを「ボット」と呼びますが、外部から指令を送ると、この「ボット」が起動され、一斉攻撃を行います。命令一つで操れるゾンビパソコン群をボットネットと呼んでいます。ボットネットは攻撃だけではなく大量の迷惑メール送信にも使われています。

    ゾンビパソコンにならないようにするには、少し気をつければ、よいだけですが、これが出来ていません。OSの定期アップデートを行い、ウイルス対策ソフトで最新のウイルス定義ファイルにアップデートしていたら問題はありません。

    ただ高齢者の中にはウイルス対策ソフトの期限が切れても更新をどうしたらよいか分からず、ほったらかしにしていることがあります。こうなると手のうちようがありません。

    Reply
  3. shinichi Post author

    Zombie (computer science)

    http://en.wikipedia.org/wiki/Zombie_(computer_science)

    In computer science, a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of zombie computers are often used to spread e-mail spam and launch denial-of-service attacks. Most owners of zombie computers are unaware that their system is being used in this way. Because the owner tends to be unaware, these computers are metaphorically compared to zombies.

    Reply

Leave a Reply to shinichi Cancel reply

Your email address will not be published. Required fields are marked *