![]() |
Chicago (UPI) Jun 01, 2005 A computer enthusiast downloads the latest saucy Paris Hilton ad, from the Carl's Jr. chain, from the Internet and sends it to his office colleagues. Later that evening, his company finds 67 of its 92 computers have been invaded and are being controlled remotely by hackers, who have sent out a million e-mails touting Viagra, the male potency supplement. "They did not realize that the 30 second clip had a virus attached to it," said Gregory Evans, chief executive officer of CEO LIGATT Security, an IT consulting company in Los Angeles, referring to a client. Nor do most Americans, apparently, understand the pervasiveness of computer zombies, as they are called: PCs taken over by hackers and used for illicit advertising on the Web. So, the Federal Trade Commission and a number of other government agencies, here and abroad, have begun targeting zombies, experts told UPI's The Web. "I see more and more innocent computers being manipulated every day," Evans said. According to the FTC, spammers use secret software that allows them to hijack personal computers and office PCs, and route spam through them. By routing their e-mails through zombie computers, the spammers are able to hide their true origin from consumers and make it more difficult for law enforcement to arrest them. The zombies do not destroy PC hard drives, but they do tap into bandwidth. "Zombies don't pose a threat to computers, but rather to Internet connectivity," said Joe Cupano, technical director of Solsoft, a security policy server developer in Mountain View, Calif. "To survive, zombies must keep your computer running. The the real threat is to the lost bandwidth going in and out of your computer, since zombies hijack your connection." Without knowing the cause, some use! rs respond by buying more bandwidth. "This is akin to feeding a hungry bear more honey in hopes the bear will leave you alone," Cupano said. "Suddenly a self-fulfilling, self-feeding vicious loop is born." Some users also try to combat the problem by buying more applications for their PCs, essentially bloating the system to a point where it needs more power to run. However, this only burdens connectivity, "which feeds the zombie," said Cupano. This is a case where government intervention into desktop territory actually may help, experts said. Recent research by MessageLabs in New York City, a leading provider of e-mail security services, indicates more than 80 percent of all spam worldwide comes from zombie PCs. "We believe these FTC measures can help reduce the overall volume of spam, while diminishing the problem of spam specifically emanating from the United States," said Matt Ser! geant, senior anti-spam technologist with MessageLabs. FTC staffers, working with other government agencies in a project called Operation Spam Zombies, are sending letters to more than 3,000 Internet Service Providers around the world, urging them to employ protective measures to prevent their customers' computers from being hijacked by spammers. Such measures include: --blocking an Internet port commonly used for e-mail when possible; --using rate-limiting controls for e-mail relays, and --locating computers that are sending large amounts of e-mail and taking steps to discern if the computer is acting as a spam zombie. The FTC also has issued a statement containing suggested measures -- some of them dramatic: --When necessary, quarantine the affected computer until the source of the problem is removed; --provide plain-language! information for customers on how to keep their home computers secure, and --provide customers or point to to easy-to-use tools to remove zombie code from infected computers. In addition to having one's PC become a staging area for computer junk e-mail, zombie software -- sometimes known by the broader term spyware -- can undertake other nefarious tasks. Experts said the software can retrieve files left on the computer via a backdoor and install keystroke loggers to retrieve bank passwords or other personal information. "They can also corrupt files on the user's computer in a malicious manner," said Charles McColgan, chief technology officer at FrontBridge, an IT security company in Los Angeles. "When a zombie is installed on a user's home computer, that computer is now at the mercy of some hacker." Consumers, however, should not only rely on the federal government's lobbying of ISPs ! to secure their PCs, but they also should take proactive steps themselves. These include updating PCs with the latest anti-virus software, patching the computer's operating system, browser and related programs, such as Microsoft Office, said Mike Weider, founder and chief technology officer of Watchfire, a provider of online risk management software and services. He also provided some cautions for regular Internet users. "Do not click on links in e-mails -- even if you think the e-mail is from someone you know," said Weider. "Recent scams have become more sophisticated, allowing phishers to exploit readily available personal information and craft e-mails that are seemingly more legitimate." Last, he warns, "always remember to log out of online sessions." Gene J. Koprowski is a 2005 Winner of a Lilly Endowment Award for his columns for United Press International. He covers telecommunications for UPI Science News. All rights reserved. Copyright 2004 by United Press International. Sections of the information displayed on this page (dispatches, photographs, logos) are protected by intellectual property rights owned by United Press International. As a consequence, you may not copy, reproduce, modify, transmit, publish, display or in any way commercially exploit any of the content of this section without the prior written consent of by United Press International. Community Email This Article Comment On This Article Related Links SpaceDaily Search SpaceDaily Subscribe To SpaceDaily Express
Heidelberg, Germany (SPX) Jan 11, 2006In the last few years, more and more research has focused on the biosphere; particularly, on how gases which influence the climate are exchanged between the biosphere and atmosphere. Researchers from the Max Planck Institute for Nuclear Physics have now carefully analysed which organic gases are emitted from plants. |
|
| The content herein, unless otherwise known to be public domain, are Copyright 1995-2006 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA PortalReports are copyright European Space Agency. All NASA sourced material is public domain. Additionalcopyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement |