Feeds

Telia blocks spam-sending Zombie PCs

Trojans nipped in the bud

  • alert
  • submit to reddit

Using blade systems to cut costs and sharpen efficiencies

TeliaSonera, the leading telecommunications group in the Nordic and Baltic regions, will start to immediately block Internet traffic to and from computers that send junk email or spam, the company announced yesterday.

In order to prevent the rapid spread of spam and virus mails, the company will block all Trojan-infected PCs without warning. TeliaSoneria is the first ISP in Europe to take such drastic measures.

So far, most ISPs have only blocked Internet traffic to certain PC ports. In the UK NTL last month started blocking port 135 traffic on its Internet service. Port 135 is generally used for connections to Microsoft Exchange servers on corporate networks, but it was also compromised by the Welchia and Blaster worms.

A PC that is infected with a Trojan can send more than 100,000 spam messages or viruses in a single day. A time lapse of two weeks between the discovery and blocking of computers that send spam is therefore no longer acceptable, TeliaSoneria says. The company emphasises that it is not blocking computers on a permanent basis. Telia will offer assistance to solve the problem and then remove the blocking procedure afterwards.

Whether it will prevent a complete swamping or inundation of viruses remains to be seen. The recent Sobig.F mass-mailing virus carpet-bombed the Internet, causing chaos on corporate networks. Shutting down access to all these computers at the same time may not be possible.

TeliaSonera says that the number of customer complaints related to spam and computer viruses has increased ten-fold from 300 to 3,000 every 24 hours, and that something needs to be done. "The Internet is easy to use, but this constant flood of spam that we are now witnessing is creating costs and problems for our customers and we won't accept it,' Marie Ehrling, head of TeliaSonera Sweden, says.

John Leyden adds: Telia is taking a bold step but the policy should pay off, so long as the company correctly identifies infected machines and is responsive to customer requests to disinfect their PCs. A free AV tools such as AVG from GRISoft is one of the more straightforward ways to clean-up infected machines. We trust Telia's good sense will prevail in temporarily allowing the infected onto the Net to download updates.

Alternatives, which normally involve using RegEdit to delete viral changes to infected PCs, are hazardous.

Meanwhile what is Telia doing to put its own house in order?

Since March, Telia has used the Mail Abuse Prevention System (MAPS) to block email from known senders of electronic junk mail. In addition, Telia plans to introduce general protection against viruses in both incoming and outgoing mail, as well as protection against spam in email that is addressed to receivers outside its network. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.