Feeds

TalkTalk turns StalkStalk to build malware blocker

Unheralded system shadows browsers round the web

Next gen security for virtualised datacentres

It's less TalkTalk, more StalkStalk: the UK's second largest ISP has quietly begun following its customers around the web and scanning what they look at for a new anti-malware system it is developing.

Without telling customers, the firm has switched on the compulsory first part of the system, which is harvesting lists of the URLs every one of them visits. It often then follows them to the sites to scan for threats.

The data will be used by the second part of the system, which will block potentially dangerous sites at network level.

A poster on TalkTalk's official forums first noticed he was being followed in early July.

"I've got a pretty serious privacy issue," samnwb wrote. "I have two Opal Telecom IPs that are following my every move, they follow me to every page that I visit."

The poster runs websites and was able to see the two IP addresses tailing him in logs. Opal Telecom is TalkTalk's business ISP subsidiary.

Other forum posters replicated samnwb's observations, and following speculation that the stalking IP addresses could be part of law enforcement compliance, or a targeted advertising system, TalkTalk staff weighed in with answers.

"We are developing some really exciting new security and parental control services, which will be based deep within our network infrastructure, to provide our customers with greater protection for all the devices they connect to their broadband line with," the firm said.

"We've had considerable feedback from customers that PC-based software only deals with part of the wider security problem facing today's internet users, so we’ve developed these new services to help improve our customers online experience with us."

The new system is provided by Chinese vendor Huawei, and customers can't opt out of the data collection exercise. As they browse the web, URLs are recorded and checked against a blacklist of sites known to carry malware. They are also compared to a whitelist of sites that have been scanned for threats and approved in the last 24 hours.

If a URL appears on neither list, Huawei servers follow the user to the page and scan the code. According to measurements by webmasters, the TalkTalk stalker servers show up between about 30 seconds and two minutes after TalkTalk subscribers.

A spokeswoman for the firm told The Register it had not told customers it would be following them online because it is not gathering details of their personal activity, but instead making basic lists of all web pages passing over its network.

In its statement the firm sought to head off the privacy concerns stirred by harvesting of URLs.

"Our scanning engines receive no knowledge about which users visited what sites (e.g. telephone number, account number, IP address), nor do they store any data for us to cross-reference this back to our customers," it said.

"We are not interested in who has visited which site - we are simply scanning a list of sites which our customers, as a whole internet community, have visited."

However the system touches on the same legal issues that dogged Phorm's targeted advertising system. Under the relevant laws, URLs are deemed communications content, and intercepting them without customer permission is prohibited.

TalkTalk's spokeswoman said that URLs added to the whitelist are deleted after 24 hours, while blacklisted pages are checked every day and unblocked if they are clean for seven days in a row.

When the blocking features and parental controls of the system are activated, customers will be asked if they want to opt in at no extra cost, TalkTalk representatives said. The service will launch in the second half of this year once testing is complete, the spokeswoman added.

TalkTalk is probably just the first major ISP to implement network-level anti-malware blockers. There have been political calls for ISPs to take some responsibility for protecting their users from online threats, and the industry will be keen to avoid regulation. ®

The essential guide to IT transformation

More from The Register

next story
Don't call it throttling: Ericsson 'priority' tech gives users their own slice of spectrum
Actually it's a nifty trick - at least you'll pay for what you get
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Three floats Jolla in Hong Kong: Says Sailfish is '3rd option'
Network throws hat into ring with Linux-powered handsets
Netflix swallows yet another bitter pill, inks peering deal with TWC
Net neutrality crusader once again pays up for priority access
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
EE: STILL Blighty's best mobe network, says 'Frappucino' Moore
Fresh round of network stats fisticuffs possibly on the cards here
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
Tech city types developing 'Google Glass for the blind' app
An app and service where other people 'see' for you
Canadian ISP Shaw falls over with 'routing' sickness
How sure are you of cloud computing now?
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.