[152474] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Operation Ghost Click

daemon@ATHENA.MIT.EDU (Livingood, Jason)
Tue May 1 08:27:21 2012

From: "Livingood, Jason" <Jason_Livingood@cable.comcast.com>
To: Jeff Kell <jeff-kell@utc.edu>, Andrew Latham <lathama@gmail.com>
Date: Tue, 1 May 2012 12:26:21 +0000
In-Reply-To: <4F99FE80.6010007@utc.edu>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 4/26/12 10:03 PM, "Jeff Kell" <jeff-kell@utc.edu> wrote:

>And what about the millions of users unknowingly infected with
>"something else" ??
>
>(We have enough trouble isolating/remediating issues among our
>relatively small user base, I'd hate to be facing a major ISP size
>support/remediation effort...)
>
>Does anyone have a plan?

Well, there's the new botnet code of conduct think (Mike O'Reirdan can
chime in with more info here). Plus ISPs like the one I work at (Comcast)
have been doing bot notification and remediation for some time now. I know
other ISPs have different approaches, and so different bot programs, but
the majority of them are doing something (with a few exceptions).

Jason



home help back first fref pref prev next nref lref last post