B
Big Mac
In brief:
Four-fifths of spam now emanates from computers contaminated with
Trojan horse infections, according to a study by network management
firm Sandvine out this week.
Instead of using open mail relays or unscrupulous hosts (so-called
'bullet-proof' hosting - in reality, ISPs in developing countries who
pull the plug on spammers when enough complaints are received by their
upstream provider), spammers are using compromised machines to get
their junk mail out. Many security firms reckons many of the most
well-publicized worm attacks in recent months (such as MyDoom and
Bagle) were launched expressly to install spam Trojans on unsuspecting
end users' machines - waiting to be utilized later as a spam delivery
relay.
Full article:
http://www.theregister.co.uk/2004/06/04/trojan_spam_study/
---- end
Four-fifths of spam now emanates from computers contaminated with
Trojan horse infections, according to a study by network management
firm Sandvine out this week.
Instead of using open mail relays or unscrupulous hosts (so-called
'bullet-proof' hosting - in reality, ISPs in developing countries who
pull the plug on spammers when enough complaints are received by their
upstream provider), spammers are using compromised machines to get
their junk mail out. Many security firms reckons many of the most
well-publicized worm attacks in recent months (such as MyDoom and
Bagle) were launched expressly to install spam Trojans on unsuspecting
end users' machines - waiting to be utilized later as a spam delivery
relay.
Full article:
http://www.theregister.co.uk/2004/06/04/trojan_spam_study/
---- end