nanog mailing list archives
Re: short Botnet list and Cashing in on DoS
From: Gadi Evron <ge () linuxbox org>
Date: Sat, 09 Oct 2004 22:17:11 +0200
From a recent email I gather this is very off-topic, so I will try to be brief in my reply.
(Geneva.CH.EU.*) since 3+ years. I can say from my experiences I couldn't make any kind of communication between botnets and spam. Most Trojan codes I have looked into doesn't have any command/action to make users send spam emails and such however they try infecting others by different ways that port 25 can't avoid.
Short answer:Many of the infected systems have more Trojan horses installed than the original infecting agent. Many Trojan horses have spam-sending or relaying capabilities.. or even just anonymity capabilities or ID theft/DDoS options. Thing is, there are always more options that can be later installed.
As to you not seeing them.. I suppose it's as simple as you not seeing enough of them.. count your blessings.
Gadi.
Current thread:
- Re: short Botnet list and Cashing in on DoS, (continued)
- Re: short Botnet list and Cashing in on DoS Edward B. Dreger (Oct 11)
- Re: short Botnet list and Cashing in on DoS David Lesher (Oct 09)
- Re: short Botnet list and Cashing in on DoS Stephen J. Wilcox (Oct 09)
- Re: short Botnet list and Cashing in on DoS Gadi Evron (Oct 09)
- Re: short Botnet list and Cashing in on DoS Stephen J. Wilcox (Oct 09)
- Re: short Botnet list and Cashing in on DoS Paul Vixie (Oct 09)
- Re: short Botnet list and Cashing in on DoS Alexei Roudnev (Oct 09)
- Re: short Botnet list and Cashing in on DoS Petri Helenius (Oct 09)
- Re: short Botnet list and Cashing in on DoS Michael . Dillon (Oct 11)
- Re: short Botnet list and Cashing in on DoS John Kristoff (Oct 22)