New Visitors Privacy Policy Sponsorship Contact Us Media
Baby Boomers Family Green Home and Auto In Critical Condition Just Starting Out Lifestyle Money
- advertisement -
Bankrate.com
News & Advice Compare Rates Calculators
Rate Alerts  |  Glossary  |  Help
Mortgage Home
Equity
Auto CDs &
Investments
Retirement Checking &
Savings
Credit
Cards
Debt
Management
College
Finance
Taxes Personal
Finance

 

Cybercriminals use 'bots' to scam

What it is: A botnet is a network of compromised computers -- usually, home computers with a broadband connection. Computers can get hijacked through backdoor Trojans, the main malware used in English-speaking countries and PCs with English set as the dominant language, according to Ronald O'Brien, senior security analyst with Sophos Plc. Once the Trojan has done its work, a third party can operate the computer, using it to send spam to other computers without the user's knowledge, scan for passwords, install keystroke-logging software or await commands from its master.

- advertisement -

Botnets comprise the primary source of spam, says O'Brien.

Paul Wood of MessageLabs says that the hackers behind the botnets are working to make botnets more robust. Now when anti-spam software interrupts communication in the botnet, the botnet no longer dies, necessarily. The con artist simply sends a new channel to one computer, which then shares it with the other computers using peer-to-peer technology.

David Marcus, security research and communications manager for McAfee Avert Labs, expects botnets to increase in volume in 2007.

Botnets
Bot programs can perform automated tasks on users' computers without their knowledge. While anti-spyware software can clean bot software, in the meantime it can scan for passwords, search browsing history, capture keystrokes, send spam and report data back to a third party across the Internet.
Here is an example of what the bot file itself looks like in memory. The seemingly random words are actually part of a username and password list.
 

What you can do: Keep your anti-virus software running and up to date. Marcus says that running daily anti-virus scans should detect and clean any bot software residing on your computer.

6 types of Internet scams on the prowl:
Attacks using Web 2.0 sites will increase.
Malware will spread through instant messaging.
Volume of image spam will rise.
Phishing e-mails getting more sophisticated, targeted.
Botnets will grow in popularity among cybercriminals.
Phone threats will soon strike.
Bankrate.com's corrections policy
-- Posted: Feb. 22, 2007
 
 
Create a news alert for "saving"
 
 RESOURCES
14 must-know terms to protect computer
10 ways to thwart cybercriminals
Wipe hard drive clean or risk ID theft
 TOP PERSONAL FINANCE STORIES
Video: 5 myths about going green
5 myths about going green
Video: Ways to keep produce fresh
 

Compare Rates
NATIONAL OVERNIGHT AVERAGES
30 yr fixed mtg 4.45%
48 month new car loan 3.77%
1 yr CD 0.89%
Rates may include points
RELATED CALCULATORS
  How much life insurance do I need?  
  Calculate your payment on any loan  
  What will it take to save for a goal?  
VIEW ALL  
BASICS SERIES
Begin with personal finance fundamentals:
Auto Loans
Checking
Credit Cards
Debt Consolidation
Insurance
Investing
Home Equity
Mortgages
Student Loans
Taxes
Retirement
FINANCIAL LITERACY
Rev up your portfolio
with these tips and tricks.
- advertisement -
- advertisement -

About Bankrate | Privacy Policy/Your California Privacy Rights | Online Media Kit | Partnerships | Investor Relations | Press Room | Contact Us | Sitemap
NYSE: RATE | RSS Feeds |

* Mortgage rate may include points. See rate tables for details. Click here.
* To see the definition of overnight averages click here.

Bankrate.com ®, Copyright © 2014 Bankrate, Inc., All Rights Reserved, Terms of Use.