{"id":1903,"date":"2006-10-31T00:00:00","date_gmt":"2006-10-31T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/10\/31\/bot-nets-likely-behind-jump-in-spam\/"},"modified":"2021-12-30T11:40:16","modified_gmt":"2021-12-30T11:40:16","slug":"bot-nets-likely-behind-jump-in-spam","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/10\/31\/bot-nets-likely-behind-jump-in-spam\/","title":{"rendered":"Bot nets likely behind jump in spam"},"content":{"rendered":"<p>A significant rise in the global volume of spam in the past two months has security analysts worried that bot nets are increasingly being used by spammers to stymie network defenses erected to curtail bulk email.  Estimates of the magnitude of the increase in junk email vary, but experts agree that an uncommon surge in spam is occurring.  On the low side, Symantec, the owner of SecurityFocus, has found that average spam volume has increased almost 30 percent for its 35,000 clients in the last two months.  Others have seen much more significant jumps: Spam black list maintainer Total Quality Management Cubed has seen a 450 percent increase in spam in two months, and the amount of spam filtered out every week by security software maker Sunbelt Software has more than tripled compared to six months ago.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While bulk emailers have, in the past, sent unwanted messages from a single server, increasingly the spam emanates from networks of compromised PCs, known as bot nets.  The level of junk email has increased almost in lock step with the number of compromised systems used for spam, said David Hart, the administrator for Total Quality Management.   <\/p>\n<p>&#8220;What is most alarming is that new clients &#8211; internet addresses that we have never seen before and which could be new infections &#8211; have tripled since June,&#8221; said Hart, who posted a chart (http:\/\/tqmcube.com\/tide.php) tracking the growth on his Web site this week.<\/p>\n<p>Bots and bot nets have rapidly emerged as one of the major threats on the Internet (http:\/\/www.securityfocus.com\/brief\/195).<\/p>\n<p>Tens of thousands of compromised PCs are frequently counted among a single bot net&#8217;s unwilling members, with some bot nets boasting as many as a million systems (http:\/\/www.securityfocus.com\/brief\/19).<\/p>\n<p>Traditionally, the networks have been used to install adware (http:\/\/www.securityfocus.com\/news\/11353) on victims&#8217; machines or level denial-of-service attacks (http:\/\/www.securityfocus.com\/news\/11392) at online companies as part of an extortion scheme.  Now, spammers are frequently counted among the operators or the clients of bot nets.  Last May, a spammer only identified as &#8220;PharmaMaster&#8221; used a bot net to target anti-spam provider Blue Security and its Internet service providers with a massive denial-of-service attack that blocked access to the companies for hours and, in the case of Blue Security, days.  Because of the attack, the company exited the anti-spam business (http:\/\/www.securityfocus.com\/news\/11392).  Many bot herders &#8211; as the criminals that infect computers with bot software are named &#8211; sell or rent bot nets (http:\/\/www.securityfocus.com\/news\/11370) to others to use, and spammers increasingly seem to be among their customers.<\/p>\n<p>There is strong evidence that bot nets &#8211; networks of compromised PCs &#8211; are behind the recent jump in spam.  Sunbelt Software analyzed the junk email messages received by one of its dummy accounts in the past 48 hours: The 1,110 blocked messages came from 160 different mail servers as determined by their Internet addresses.  The data suggests that a large number of compromised PCs are participating in sending out spma.<\/p>\n<p>&#8220;It&#8217;s pretty easy, once you start breaking out the numbers, to tell a bot net from a run-of-the-mill spam server,&#8221; Greg Kras, vice president of products for Sunbelt.  &#8220;Honestly, I think the increase is an attempt to keep viability by the corporations that are doing spam,&#8221; Kras said  <\/p>\n<p>Because many spam and antivirus filters send back a rejection message to the sender, the actual owner of the email address will be inundated with replies.  Other Internet users may not notice the increase, because the spam messages are blocked by email filters or by anti-spam software on their PCs.<\/p>\n<p>Security researchers that use honey pots &#8211; heavily monitored computers that are allowed to be infected by malicious software to spy on the attackers &#8211; have also confirmed the connection (http:\/\/www.securityfocus.com\/brief\/328) between bot nets and spam, said Thorsten Holz, a graduate student and the founder of the German Honeynet Project.  &#8220;Since more and more network operators shut down open mail relays or other administrators use black lists to block these open relays, the attackers have shifted their tactics: they use compromised machines &#8211; in the form of bot nets &#8211; to send out spam,&#8221; Holz said.   &#8220;We should be teaching people not to do business with criminals and to stop giving credit cards to criminals,&#8221; Hart said.<\/p>\n<p>http:\/\/www.theregister.co.uk\/2006\/10\/31\/botnet_spam_surge\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1903","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1903"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1903\/revisions"}],"predecessor-version":[{"id":4390,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1903\/revisions\/4390"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1903"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}