[74643] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: short Botnet list and Cashing in on DoS

daemon@ATHENA.MIT.EDU (Gadi Evron)
Sat Oct 9 16:14:07 2004

Date: Sat, 09 Oct 2004 22:17:11 +0200
From: Gadi Evron <ge@linuxbox.org>
To: Mehmet Akcin <mehmet@akcin.net>
Cc: nanog@merit.edu
In-Reply-To: <!~!UENERkVCMDkAAQACAAAAAAAAAAAAAAAAABgAAAAAAAAAH97GtpCKokie78mQhUIYe8KAAAAQAAAAr4Sj3Y4VI0mz/wGcjbqrfAEAAAAA@akcin.net>
Errors-To: owner-nanog-outgoing@merit.edu


 From a recent email I gather this is very off-topic, so I will try to 
be brief in my reply.

> (Geneva.CH.EU.*) since 3+ years. I can say from my experiences I couldn't
> make any kind of communication between botnets and spam. Most Trojan codes I
> have looked into doesn't have any command/action to make users send spam
> emails and such however they try infecting others by different ways that
> port 25 can't avoid.

Short answer:
Many of the infected systems have more Trojan horses installed than the 
original infecting agent. Many Trojan horses have spam-sending or 
relaying capabilities.. or even just anonymity capabilities or ID 
theft/DDoS options. Thing is, there are always more options that can be 
later installed.

As to you not seeing them.. I suppose it's as simple as you not seeing 
enough of them.. count your blessings.

	Gadi.

home help back first fref pref prev next nref lref last post