Feeds

Botnet 'pandemic' threatens to strangle the net

We're all MyDoomed

High performance access to file storage

Networks of of compromised PCs are threatening the smooth operation of the internet, the World Economic Forum was told this week.

Up to a quarter of online computers are virus-infected components in botnet networks of PCs under the control of hackers, according to net luminary Vint Cerf. Cerf, who co-developed the TCP/IP protocol, compared the spread of botnets to a disease that has reached "pandemic" proportions.

Cerf estimated that between 100 million and 150 million of the 600 million PCs on the internet are under the control of hackers, the BBC reports. "Despite all that, the net is still working, which is pretty amazing. It's pretty resilient," he said.

Cerf made his comments during a panel discussion on the future of the internet at the World Economic Forum in Davos, Switzerland, this week. During the debate, security columnist John Markoff, of the New York Times said one particular botnet attack consumed 15 per cent of Yahoo's search capacity for a brief period. The goal of the attack was to retrieve text snippets that were used in a attempt to disguise junk mail messages in a bid to smuggle spam past filters.

Other members of the panel including Michael Dell, founder of Dell computers, and Hamadoun Toure, secretary general of the International Telecommunication Union, agreed there was a pressing need to solve the problem. Improved operating system security and user authentication might help in this, but no "silver bullet" solution emerged during the discussion. Dell suggested greater use of network computers, or as he put it "disposal virtual PCs", might reduce the problem. Toure said greater co-operation between regulators, government, security firms, telecom providers, and end users was needed.

Botnets of compromised PCs are used by hackers for purposes such as relaying spam and launching denial of service attacks against targeted websites. In most cases users are blissfully unaware of infection, perhaps only noticing a slight degradation in performance. The problem is well recognised in internet security circles and among ISPs.

Intelligence from either the sale of access to botnet resources on the internet or from ISP takedown efforts suggests groups of 50,000 or so compromised PCs or smaller are common, by which reckoning Cerf's figures seem rather high. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.