-----Original Message----- From: information_technology-admin@private [mailto:information_technology-admin@private] On Behalf Of InfraGard Sent: Thursday, January 22, 2004 7:11 AM To: Information Technology Subject: [Information_technology] Daily News 1/22/04 January 20, BBC News - Viruses turn to peer-to-peer nets. Virus writers are setting up peer-to-peer networks to help their malicious creations spread. The networks are being used to control thousands of innocent PCs that some virus programs have infected. The tactic is being used because peer-to-peer networks are hard to disrupt, making viruses using this technique hard to stop spreading. One of the first viruses to set up a peer-to-peer network to help it spread was the Slapper worm that was aimed at the Linux operating system. A Windows virus called Sinit appeared in late 2003 that turned every machine infected by the malicious program into a member of a peer-to-peer network. It was expected that Sinit's creator would issue commands to infected computers via this network. In the past some creators of Trojan programs, that open up a backdoor into an infected PC, have used net chat channels as a way to issue commands. Often thousands of computers were enrolled in these remote controlled networks that have been dubbed "bot nets." Finding and shutting down the chat channels would effectively cut a virus writer off from his network of slave machines. But shutting down a distributed network would be much more difficult because no one machine is in charge. It also is much more difficult to trace where commands were being inserted and find the network's controller. Source: http://news.bbc.co.uk/1/hi/technology/3409187.stm Internet Alert Dashboard Current Alert Levels AlertCon: 1 out of 4 https://gtoc.iss.net Security Focus ThreatCon: 1 out of 4 http://analyzer.securityfocus.com/ Current Virus and Port Attacks Virus: #1 Virus in the United States: WORM_LOVGATE.G Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus Tracking Center [Infected Computers, North America, Past 24 hours, #1 in United States] Top 10 Target Ports 135 (epmap), 6129 (dameware), 1434 (ms?sql?m), 137 (netbios?ns), 1433 (ms?sql?s), 27374 (SubSeven), 445 (microsoft?ds), 80 (www), 53(domain), 4662 (eDonkey2000) Source: http://isc.incidents.org/top10.html; Internet Storm Center _______________________________________________ Information_technology mailing list Information_technology@listserv
This archive was generated by hypermail 2b30 : Thu Jan 22 2004 - 09:03:03 PST