Trojans as spam robots

Discussion in 'malware problems & news' started by FanJ, Feb 23, 2004.

Thread Status:
Not open for further replies.
  1. FanJ

    FanJ Guest

    The Register:

    http://www.theregister.com/content/55/35722.html

    Quotes:

    Trojans as spam robots: the evidence
    By Jan Libbenga
    Posted: 22/02/2004 at 12:18 GMT

    German magazine c't says it has evidence that virus writers are selling the IP addresses of PCs infected with Trojans to spammers. Spammers use these infected systems to unlawfully distribute commercial email messages, without the knowledge of their owners.

    The Trojan involved was spread by a virus called Randex. This small program contacted its 'master' through the chat protocol IRC. It was programmed to look for CD keys of games, or secretly load additional software. The Trojan was also able to install a proxy server which can be used to relay spam through the infected PCs.

    A college student managed to track down the distributor of a computer virus in the UK, and the editorial staff of c't was then able to buy access to the infected machines.

    c’t passed on all the information to New Scotland Yard and several individuals in different countries have been arrested, the magazine claims.

    Full details in the print issue of c't, available in German from Monday February 23.

    Security experts and spam fighters have always assumed that spammers use Trojans to turn home workstations into unwitting hosts or zombies in pornography and spam distribution rings. Not only can these techniques be used to bypass IP address blacklists, but also to launch DoS attacks. ®

    - end quote -


    PS:
    Mods/admins: I was not sure where to post this.
    Please feel free (of course !) to move it to another forum-section. Cheers, Jan.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.