[70466] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Antivirus firms discover Bots

daemon@ATHENA.MIT.EDU (Joel Jaeggli)
Sun May 16 11:37:36 2004

Date: Sun, 16 May 2004 08:36:59 -0700 (PDT)
From: Joel Jaeggli <joelja@darkwing.uoregon.edu>
To: "Stephen J. Wilcox" <steve@telecomplete.co.uk>
Cc: Sean Donelan <sean@donelan.com>, <nanog@merit.edu>
In-Reply-To: <Pine.LNX.4.44.0405161623280.2032-100000@server2.tcw.telecomplete.net>
Errors-To: owner-nanog-outgoing@merit.edu


On Sun, 16 May 2004, Stephen J. Wilcox wrote:

> 
> Hmm, so if the AV discovers an active bot is it possible to take this a step 
> further and locate the C&C and forward that info to relevant network operators?

at the point the av software itself is spyware.

joelja
 
> Steve
> 
> 
> 
> On Sat, 15 May 2004, Sean Donelan wrote:
> 
> > 
> > I'm glad that anti-virus firms are noticing the growth of Bots.
> > Unfortunately, their guestimating ability is still woefully inadequate.
> > 
> > Even frequent updates to anti-virus software won't help.  Many
> > bots disable automatic updates and block access to the antivirus
> > sites.  By the time anti-virus software detects somethings wrong,
> > its already too late.  The solution is to make certain your computer is
> > not compromised, instead of relying on anti-virus to clean it up later.
> > 
> > Antivirus firms warn of growing 'Bot' Networks
> > http://www.informationweek.com/story/showArticle.jhtml?articleID=20300880
> > 
> 

-- 
-------------------------------------------------------------------------- 
Joel Jaeggli  	       Unix Consulting 	       joelja@darkwing.uoregon.edu    
GPG Key Fingerprint:     5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2



home help back first fref pref prev next nref lref last post