[botnets] Botnets and home video game consoles.

2007-12-10 Thread Jim O'Gorman
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
--After the discussion a few weeks ago regarding malware directed toward OS X,
I got to thinking about the conditions required for botnet harvesting to
take place. I put together a rough model that I then applied to home video
game consoles. If you are interested, you can read my thoughts up at
http://www.elwood.net/post/21048401.

I would be interested in any criticism that you may have on the model I
outline. I know it could use some tweaking, and input would be great.

Thanks.
-- 
Jim O'Gorman
[EMAIL PROTECTED]
http://www.elwood.net
___
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets


Re: [botnets] mac trojan in-the-wild

2007-11-04 Thread Jim O'Gorman
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
--On 11/4/07, Kyle Lutze [EMAIL PROTECTED] wrote:



 What makes me unhappy is that people are using an SE exploit as a
 way to say here's proof that a mac is as insecure as a windows box
 or gadi saying the itw barrier has been broken for apple (read above
 about requirements for itw status). No computer is 100% secure, but
 with a default setup of windows vs. mac a mac is still more secure.
 if they were to write this trojan for a windows box they wouldn't
 have to worry about requiring superuser authentication on the
 majority of systems as by default your account is an administrator
 account on windows and not many end users change that, or they could
 just take advantage of any of the multitude of vulnerabilities
 available on windows boxes directly connected to the internet to
 install it automatically without even having to attach it as a fake
 video codec to a porn video.


From my personal POV here, I think it best to break this down the the
simplest terms.
If we want to assume that Risk = Threat x Vulnerability, then the issue here
is not Vulnerability. I think everyone here agrees that the Vulnerability
being exploited in this situation is the user. However, Threat has just
increased. And with this increase in threat, the risk that automated
vulnerabilities will be exploited in the future has now increased.

My point is nothing more then being ignored does not make you more secure.
Bully for Apple that they are no longer ignored.

-- 
Jim O'Gorman
[EMAIL PROTECTED]
http://www.elwood.net
___
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets


Re: [botnets] mac trojan in-the-wild

2007-11-03 Thread Jim O'Gorman
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
--On 11/3/07, Gadi Evron [EMAIL PROTECTED] wrote:


 You really think a criminal group with revenue goals targets the mac to
 make some mac users feel unhappy?


What is amusing about this whole situation is the Mac Defender attitude
that rises up when ever it comes out Apple is not perfect. This happened a
while back with the wireless issues and now is coming out again.

Gadi is 100% right, these people are not doing this for fun or bragging
rights. This is a potential market opportunity that has been ignored up to
this point. Macs up to this point have not been the target of malware
attacks, and as such you have this ever growing audience of fresh
faced innocent babes that have not experienced the harsh reality that users
on windows based systems have been living with.
A lot like some city boys driving out to some rural area where people don't
lock their doors for some easy pickings.
So why not throw out a couple trojans like this and see how many systems
they pick up? Then see what the total ROI was. Decide at that point if it is
worth doing more.

If nothing else, it starts to refine the attacks so when Macs are more
pervasive the attackers have a plan of attack. That day is coming if
you believe the reports about 40% of college users on Macs. (
http://www.dailyprincetonian.com/archives/2007/10/05/news/18871.shtml 40
percent of Princeton students and faculty use Macs as their personal
computers.) Honestly, I thought most Mac folk would see this as a good
thing, it shows the Mac has become enough of a player on the market to be
worth attacking.
On the other hand, if you ran out to the Mac suburb to get away from all
the bad crap happening in the Windows neighborhood, it might be time to
move further out... Ubuntu just came out with a new release, Cory Doctorow
has moved from the mac to ubuntu (
http://www.boingboing.net/2006/06/29/mark-pilgrims-list-o.html) so it must
be the next hip thing to do. White flight everyone, all the cool kids are
doing it.


-- 
Jim
___
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets