Feeds

Britain tops zombie PC charts

Fear of a bot planet

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Britain has the largest zombie PC population of any country on the planet, according to the latest Symantec Internet Security Threat Report.

The UK has more than a quarter (25.2 per cent) of all bots – virus-infected, zombie PCs under the control of crackers and used for malicious purposes like identity theft and online fraud – with the US (24.6 per cent) and China (7.8 per cent) in second and third place. The statistics, taken from Symantec’s Global Internet Threat Report for the period July to December 2004, are based on the number of PCs worldwide that are known to be infected with bot agents, such as the infamous Agobot worm.

The prevalence of botnets has become a key issue in information security over recent months. Botnets are computers which are infected by worms or Trojans and taken over surreptitiously by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.

Worst offender

In the first half of 2004, Finland had the highest level of bot infection. This time around it doesn't even chart. Nigel Beighton, Symantec’s Director of Enterprise Strategy, EMEA, blames Britain's pre-eminence in the latest chart to the rapid roll-out of broadband in this country. "We saw 93 per cent growth in broadband connections last year and this has had a huge impact on the number of people accessing the Internet. Unfortunately, new broadband users may not be fully aware of the additional safety precautions that need to be taken when using an always-on high-speed Internet connection. Clearly, awareness around security issues is improving and it’s making a notable difference, but education still remains the number one challenge," he said

The number of bot-infected computers declined from 30,000+ a day in July to an average of less than 5,000 a day by December, according to Symantec. Although in absolute terms the size of botnet might be decreasing the severity and risks associated with them continue to be a major problem mainly because of a noticeable shift towards the use of bots and bot networks for financial gain.

A recent study by the Honeynet Project suggested zombie controllers were running smaller botnets and limiting the chat they generate in order to try to escape detection. Symantec's Beighton rejects this theory. "I don't think the bad guys are changing how they operate, it's just that they are less successful in obtaining bots," he said.

Agobot - one of the most common agents for compromising Windows PCs - can spread by exploiting the well-known LSASS vulnerability in Windows also exploited by the Sasser worm. Beighton reckons the use of the free firewall in XP SP2 has helped curtail the rise of botnets but he said greater user awareness is a greater factor in helping to clean up the net. ®

  1. United Kingdom (25.2 per cent)
  2. United States (24.6 per cent)
  3. China (7.8 per cent)
  4. Canada (4.9 per cent)
  5. Spain (3.8 per cent)
  6. France (3.6 per cent)
  7. Germany (3.5 per cent)
  8. Taiwan (3.1 per cent)
  9. South Korea (3.0 per cent)
  10. Japan (2.6 per cent)

Related stories

Rise of the botnets
Send-Safe spam tool gang evicted by MCI
Botnets strangle Google Adwords campaigns
Heise.de under DDoS attack
Scot in court on DDoS charges
VXers creating 150 zombie programs a week
Botnet used to boost online gaming scores

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.