InformationWeek > Spam, Zombies > FTC Launches International Campaign Against Zombies > May 24, 2005



Blogs



windows software hardware security outsourcing management industries

SECURITY |   VIRUSES
FTC Launches International Campaign Against Zombies
EMAIL THIS ARTICLE
PRINT THIS ARTICLE
DISCUSS THIS ARTICLE WRITE TO AN EDITOR

 
The commission and 35 government partners from more than 20 countries launched "Operation Spam Zombies" to educate Internet service providers about hijacked computers on their networks.
By Thomas Claburn
InformationWeek


 
The Federal Trade Commission, in conjunction with 35 government partners from more than 20 countries, on Tuesday launched "Operation Spam Zombies," an international campaign designed to educate Internet service providers about hijacked, or "zombie," computers on their networks.

Zombie PCs are computers that have been compromised by attackers though the use of viruses, worms, or Trojan programs. Such machines can be controlled remotely by the attacker or those granted access in exchange for payment. Spammers and hackers use zombies to send unsolicited commercial E-mail, distribute malware, store illegal files, and conduct denial-of-service attacks without the owners' knowledge or consent. Because most criminal computer conduct falls under the jurisdiction of law enforcement agencies, the FTC is primarily concerned about zombies as a source of spam.

"Computers around the globe have been hijacked to send unwanted E-mail," Lydia Parnes, director of the FTC's Bureau of Consumer Protection, said in a statement. "With our international partners, we're urging Internet service providers worldwide to step up their efforts to protect computer users from costly, annoying, and intrusive spam 'zombies.'"

Gregg Mastoras, senior security analyst at security company Sophos plc, estimates that half of spam originates from zombie PCs. He also says that 70% to 80% of all E-mail is spam today. Don Blumenthal, Internet lab coordinator at the FTC, says he's seen credible reports that suggest as much as 80% to 90% of spam may come from zombies.

The amount of spam coming from zombies appears to be on the rise. "We're blocking 50 million E-mails coming from zombies a day," says Charles McColgan, chief technology officer of messaging management company FrontBridge Technologies Inc. "That's up from last month when it was in the 20 [million] to 30 million range."

The FTC's primary weapon in its war against zombie spam is bulk E-mail. Twenty members of the London Action Plan, an international anti-spam group, and 16 additional government agencies will E-mail several thousand ISPs around the world, asking them to take steps to protect the computers on their networks. These steps include blocking certain outbound server ports used by spammers, applying rate limiting controls on E-mail relays, profiling mail-sending patterns to identify likely zombies, and providing end-user security information and remediation tools.

In the past two years, the FTC has launched two similar campaigns, one against open relays in 2003 and "Operation Secure Your Server" in 2004. Blumenthal says the effectiveness of those earlier efforts is hard to quantify. However, he says they've generated a positive response from the Internet community and that open relays and open proxies are no longer the major problems they once were.

Mastoras says that while he applauds the effort, more needs to be done. "The Can-Spam Act was primarily a failure," he says. The FTC "needs to re-examine that and see if it can be crafted in a better way. But at some point you have to hold ISPs responsible. They need to be aware of what's going on in their network."

Awareness may help, but McColgan says that ISPs may be reluctant to implement changes if they're costly. "ISPs," he says, "tend to focus on whatever contributes the most to their bottom line."





CURRENT ISSUE
View all stories from our current issue

View stories from past issues
sorted by date.

Cover illustration ©Tomer Hanuka c/o theispot.com
smallcover
RELATED REPORTS
EMAIL THIS ARTICLE
PRINT THIS ARTICLE
DISCUSS THIS ARTICLE
LICENSE THIS ARTICLE


InformationWeek Marketplace (Sponsored Links)
Enterprise Secure Instant Messaging
See why Pepsi, iPass and others rely on Omnipod. Safe interoperability with consumer IM. Complete end-to-end security, management and control over your enterprise instant messaging. SEC, NASD and HIPAA compliant. Risk Free 30-day Test Drive.
Security Within - Configuration based Security
Configuration and policy based security systems are a pro-active way to defend against IT security attacks. Click here to request our white papers, "Security Within - Configuration based Security" and "Policy Management vs. Vulnerability Scanning".
Improve the Return on Your Security Investments.
LURHQ's Managed Security Services help enterprises maximize their security investments. Click here to learn why leading enterprises have chosen LURHQ as their Managed Security Services Partner.
Barracuda Spam and Spyware Firewall
Reclaim your Network. Stop Spam, Spyware and Viruses at the gateway. The leading solution.
WLAN Security
Best Practices for Securing Your Enterprise WLAN' Download this white paper now from AirMagnet

Buy a Link Now

Neterion >> 10 Gigabit Ethernet iSCSI SANs: Fast, Reliable and Truly Global
How does your pay rate? Check the InformationWeek Salary Survey
Mobilized Solutions Guide: Find and compare solutions for your business
Top Requested White Paper Categories from TechWeb White paper Library
Top ten search terms from the TechWeb TechEncyclopedia




Strategies and advice for better mobile software
An information resource and community focused on creating
better mobile software.
Download Free Mobilized Solutions Guide
Quickly identify and compare mobile solutions that meet your
needs - and have the providers contact you on your terms.
Mobility. Maximized
Design and deploy mobile applications
Delivering more robust and better performing applications

RELATED STORIES
Web Site Flaws Let Spammers, Phishers Build User Profiles


RELATED CONTENT

InformationWeek National IT Salary Study 2005

The Keys To Continuous Improvement
-How business-process frameworks affect management of people, processes, and technologies.

RFID -- Wisdom Of Pilots

RELATED REPORTS
Advertisement






DEVELOPMENT TOOLS
E-BUSINESS
CRM
DATABASES
ERP
BUSINESS INTELLIGENCE
COLLABORATION
COMPLIANCE





InformationWeek Videos are brief video news programs that give you even greater access to our news organization. Be sure to check back regularly to see our newest programs or to access archives of recent shows.