Feeds

Zombies infiltrate US military networks

Behind the lines

Top 5 reasons to deploy VMware with Tegile

Security researchers have traced spam-sending botnet clients back to networks run by the US military.

Support Intelligence, the firm whose research on honeynets revealed that the networks of at least 28 Fortune 1000 companies contained malware-infected spam-spewing PCs, has found evidence of bots running behind military networks.

Rick Wesson, chief exec of Support Intelligence, said the firm's honeynet system has received Viagra spam from an IP address owned by the Randolph Airforce base. Support Intelligence has also observed bots - running IP addresses owned by the Directorate of Information Management - trying to connect to botnet command and control servers, evidence that PCs run by the directorate have become spam proxies under the control of hackers.

Most security experts associate malware-infected PCs that form the zombie components of botnet networks with careless consumers. The work of Support Intelligence suggests that large IT firms, including HP and Oracle, as well as the US military, are also partly responsible for the deluge of stock offer scams, penis pill offers, and other assorted tat that deluges surfers' inboxes every day.

The misuse of US military networks by spammers and other pond life is infrequently reported, but goes back some years. In August 2004, we reported how blog comment spams promoting illegal porn sites were sent through compromised machines associated with unclassified US military networks. Spam advertising "incest, rape and animal sex" pornography was posted on a web log which was set up to discuss the ID Cards Bill via an open proxy at the gateway of an unclassified military network. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.