[70466] in North American Network Operators' Group
Re: Antivirus firms discover Bots
daemon@ATHENA.MIT.EDU (Joel Jaeggli)
Sun May 16 11:37:36 2004
Date: Sun, 16 May 2004 08:36:59 -0700 (PDT)
From: Joel Jaeggli <joelja@darkwing.uoregon.edu>
To: "Stephen J. Wilcox" <steve@telecomplete.co.uk>
Cc: Sean Donelan <sean@donelan.com>, <nanog@merit.edu>
In-Reply-To: <Pine.LNX.4.44.0405161623280.2032-100000@server2.tcw.telecomplete.net>
Errors-To: owner-nanog-outgoing@merit.edu
On Sun, 16 May 2004, Stephen J. Wilcox wrote:
>
> Hmm, so if the AV discovers an active bot is it possible to take this a step
> further and locate the C&C and forward that info to relevant network operators?
at the point the av software itself is spyware.
joelja
> Steve
>
>
>
> On Sat, 15 May 2004, Sean Donelan wrote:
>
> >
> > I'm glad that anti-virus firms are noticing the growth of Bots.
> > Unfortunately, their guestimating ability is still woefully inadequate.
> >
> > Even frequent updates to anti-virus software won't help. Many
> > bots disable automatic updates and block access to the antivirus
> > sites. By the time anti-virus software detects somethings wrong,
> > its already too late. The solution is to make certain your computer is
> > not compromised, instead of relying on anti-virus to clean it up later.
> >
> > Antivirus firms warn of growing 'Bot' Networks
> > http://www.informationweek.com/story/showArticle.jhtml?articleID=20300880
> >
>
--
--------------------------------------------------------------------------
Joel Jaeggli Unix Consulting joelja@darkwing.uoregon.edu
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2