Feeds

ISPs urged to throttle spam zombies

International clean-up campaign

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

The US Federal Trade Commission (FTC), along with more than 35 government agencies worldwide, announced an ambitious effort on Tuesday to get ISPs and other organisations to deliver the net from the plague of zombie spam networks. The group is encouraging ISPs to identify and quarantine customers whose PCs may have unwittingly been turned into spam zombies, under the control of hackers.

ISPs are also being encouraged to apply rate-limiting controls for email relays and to block port 25 (a common Internet port used for email) for inappropriate use as part of an educational campaign called Operation Spam Zombies. ISPs are also being urged to educate consumers about net security and to provide tools to disinfect computers under one of the most ambitious net security education initiatives to date.

Trojans such as Phatbot are often used to seize control of Windows PCs, turning them into zombie clients in networks of compromised PCs (botnets). These botnets are used to send spam or as platforms for DDoS attacks, carrying out criminal attacks right under the noses of their rightful owners. The tactic allows hackers to offload the computing effort in sending spam while creating a means to get past basic junk mail filters. According to email security firm MX Logic shows that during April, on average zombie PCs accounted for 44 percent of all spam.

Steve Linford, director of anti-spam organisation Spamhaus, said the FTC's advice was basically common sense even though it was often ignored by ISPs who either didn't know how to apply controls or couldn't be bothered to carry out the work. "This is something we've been advocating for years but the addition of more voices can only help the message get through," he added.

The FTC is leading the publicity drive on Operation Spam Zombies because US ISPs are the main target audience of the campaign. UK groups like Spamhaus and government agencies like the DTI and OFT are also getting behind Operation Spam Zombie which was developed by members of the London Action Plan, an international network combating spam. ®

Related stories

Britain tops zombie PC charts
Rise of the botnets
US tops junk mail list of shame - again
Telenor takes down 'massive' botnet

Secure remote control for conventional and virtual desktops

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
JLaw, Kate Upton EXPOSED in celeb nude pics hack
100 women victimised as Apple iCloud accounts reportedly popped
Rubbish WPS config sees WiFi router keys popped in seconds
Another day, another way in to your home router
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.