To report a botnet PRIVATELY please email: [EMAIL PROTECTED] ----------
Unfortunately this isn’t all that surprising.
On 4/16/07 2:25 PM, "Security Admin (NetSec)" <[EMAIL PROTECTED]> wrote: > To report a botnet PRIVATELY please email: [EMAIL PROTECTED] > ---------- > > Zombies infiltrate US military networks > Behind the lines > By John Leyden and Dan Goodin > <http://forms.theregister.co.uk/mail_author/?story_url=/2007/04/16/military_bo > tnet/> → More by this author > <http://search.theregister.co.uk/?author=John%20Leyden> > Published Monday 16th April 2007 12:26 GMT > Like this story? Receive others like it in your inbox > <http://ad.doubleclick.net/clk;89491168;13533154;o?http://elreg.regaccount.com > /register/?product=theregister_newsletter&r=http://www.theregister.co.uk/? > source=H200703NEWSLETTER> Find your perfect job - click here from thousands > of tech vacancies > <http://ad.doubleclick.net/clk;39093442;13533154;c?http://www.jobsite.co.uk/> > Security researchers have traced spam-sending botnet clients back to networks > run by the US military. > > Support Intelligence, the firm whose research on honeynets revealed that the > networks of at least 28 Fortune 1000 companies contained malware-infected > spam-spewing PCs, has found evidence of bots running behind military networks. > > > <http://ad.uk.doubleclick.net/jump/reg.security.4159/front;dcove=d;sz=336x280; > tile=3;ord=9llR4tRk6jcAADA23i0AAADR?> > Rick Wesson, chief exec of Support Intelligence, said the firm's honeynet > system has received Viagra spam from an IP address owned by the Randolph > Airforce base. Support Intelligence has also observed bots - running IP > addresses owned by the Directorate of Information Management - trying to > connect to botnet command and control servers, evidence that PCs run by the > directorate have become spam proxies under the control of hackers. > > Most security experts associate malware-infected PCs that form the zombie > components of botnet networks with careless consumers. The work of Support > Intelligence suggests that large IT firms, including HP and Oracle, as well as > the US military, are also partly responsible for the deluge of stock offer > scams, penis pill offers, and other assorted tat that deluges surfers' inboxes > every day. > > The misuse of US military networks by spammers and other pond life is > infrequently reported, but goes back some years. In August 2004, we reported > how blog comment spams promoting illegal porn sites were sent through > compromised machines associated with unclassified US military networks. Spam > advertising "incest, rape and animal sex" pornography was posted on a web log > which was set up to discuss the ID Cards Bill via an open proxy at the gateway > of an unclassified military network. ® > > > > -- Regards, Adriel T. Desautels Chief Technology Officer - Netragard, LLC Office: 617-934-0269 || Mobile : 857-636-8882 http://www.linkedin.com/pub/1/118/a45 http://www.netragard.com ------------------------- "We make IT secure."
image.gif
Description: GIF image
_______________________________________________ To report a botnet PRIVATELY please email: [EMAIL PROTECTED] All list and server information are public and available to law enforcement upon request. http://www.whitestar.linuxbox.org/mailman/listinfo/botnets
