Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
APC Free White Paper
Optimize your network investment &
Enter to win a Samsung Galaxy Note

www.apc.com
Data Security
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
Botnet Lair in Ukraine Demonstrates Dangers of Infection
Botnet Lair in Ukraine Demonstrates Dangers of Infection

By Barry Levine
December 6, 2011 12:48PM

    Bookmark and Share
The security firm said signs of infection include slow performance when doing some minor task, such as checking e-mail or surfing the Web. On a PC, the company recommends, open Task Manager and then select Network. If the Internet connection is more than a few percent usage, this could be a sign of extra transmission.
 



A recently discovered server in Ukraine demonstrates the danger -- and volume -- of industrial-level identity theft. The server, located by the United Kingdom-based security firm Prevx, was a storage site for data stolen from 160,000 computers that had been infected by viruses.

The server remained online for a month after the Internet service provider, and legal authorities, were alerted to its presence. During that time, it continued to steal data from about 5,000 computers daily, which were harvested through the use of viruses that collect and transmit data. A network of such infected computers is known as a botnet.

'Keys to the Castle'

The stolen data found in the server included e-mails, Facebook passwords, Social Security numbers and log-on info for banks. Prevx was able to find and probe the server because of its poor security protection.

Some of the data came from the infected computer of a U.S. community bank, Metro City Bank in Doraville, Ga., which apparently was not well protected. Such lax protection, said Prevx's director of malware research Jacques Erasmus, is like "giving criminals the keys to the castle." Metro City Bank has said that it is notifying customers and looking into the security breach.

Erasmus told news media that getting into a system may not initially result in "the biggest data heist ever," but this is how hackers get into a network, where they can increase their haul. An entry point through a lightly protected computer serves as a beachhead to launch a full-blown invasion.

In addition to relaying data, the botnets can also capture a stream of user activity. For instance, according to the Associated Press, the server in Ukraine had continuing information on a 22-year-old in Southern California, including registration of a domain name with GoDaddy.com, changing of a Yahoo e-mail password, and ordering from Pizza Hut -- along with data used for those transactions, such as his credit card number, birthdate, phone number and other confidential information.

Checking Net Usage

Prevx, which makes anti-botnet protective software, said thousands of PCs are infected every day and become part of botnets -- including computers protected by respected anti-virus and other security suites.

The security firm said that signs of infection include slow performance when doing some minor task, such as checking e-mail or surfing the Web. On a PC, the company recommends, open Task Manager by simultaneously pressing CTRL, ALT, and Delete keys, and then select Network. If the Internet network connection is more than a few percent usage, this could be a sign that extra transmission is going on.

Prevx suggests that the user then obtain a security product from a maker other than your current security suite, since it is obviously not doing a complete job. In addition to its own Prevx Edge, the company suggests products from AVG, Kaspersky, Panda or Sophos. In some cases, professional services may be required to remove the infection.

Security firm Symantec recommends that security software be configured to update automatically, since viruses change frequently. For Windows users, the company suggests that the most recent operating system update be installed, and that browser security settings by increased.
 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Data Security
1.   Tor Internet Privacy Service Breached
2.   Tor Working To Fix Security Exploit
3.   Protect Yourself from Identity Theft
4.   Hackers Breached StubHub Accounts
5.   Juniper DDoS for High-IQ Networks


advertisement
Tor Internet Privacy Service Breached
Users should assume they're affected.
Average Rating:
Protect Yourself from Identity Theft
Even if your data was compromised.
Average Rating:
Tor Working To Fix Security Exploit
Bug reportedly reveals ID of users
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Tor Internet Privacy Service Warns Users It Was Breached
You may never have heard of the Tor Project, but the Internet privacy service is making headlines. Tor’s devs say users might be victims of an attack launched against the project earlier this year.
 
Canadian Government Charges China With Cyberattack
The government of Canada is not happy with China. Canadian officials have accused "a highly sophisticated Chinese state-sponsored actor" of launching a cyberattack on its National Research Council.
 
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 

Enterprise Hardware Spotlight
AMD's ARM-Based Opteron Out in $3K Dev Kit
It's dubbed "Seattle" and it's AMD's first 64-bit ARM-based Opteron processor. The low-power chip is being released as part of AMD’s Opteron A1100-series developer kit, and aimed at high-end data center needs.
 
Apple Updates MacBook Pros, Cuts Prices Up to $100
The popular MacBook Pro laptop line just got an update and a price cut of as much as $100. The MacBook Pro with Retina display now includes faster processors and double the memory.
 
Dell, BlackBerry Not Sweating Apple-IBM Alliance
IBM's recent move to partner with Apple to sell iPhones and iPads loaded with corporate applications has excited investors in both companies, but two rivals say they are unperturbed for now.
 

Mobile Technology Spotlight
Virgin Mobile Offers Custom Smartphone Plans
As the wireless carrier wars continue heating up, Virgin Mobile just threw the customization coal onto the fire. The firm has debuted a no-annual-contract plan with rates based on individual use.
 
Collaboration Provider Asana Revamps Mobile App
Asana, a collaboration software provider started by a Facebook founder, is now out with a rebuilt native iOS mobile app. It replaces one that even the company admits was not up to par.
 
Facebook: You Will Use Messenger, and You Will Like It
Starting this week, Facebook users with Android and iOS phones will be forced to use the separate Messenger app to send Facebook messages. Pending messages will still be visible in the main app.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.