James Milligan wrote:
> On 09/12/2009 18:25, Johnathon Tinsley wrote:
>> Matthew Wild wrote:
>>    
>>> 2009/12/9 Andrew Drapper<and...@drapper.com>:
>>>      
>>>> It may not be the same as a sandbox, but what about installing software 
>>>> that
>>>> you are not sure about in a virtual ubuntu inside you main ubuntu say
>>>> using virtualbox?
>>>>
>>>>        
>>> This particular malware did nothing (so far) to the host machine, it
>>> simply used it (and collectively all the other machines it was
>>> installed on) to flood another server. Basically a primitive (yet
>>> effective) botnet. In this respect, if the virtual machine had network
>>> access, the malware would work still, it just wouldn't have the
>>> potential to harm *your* computer.
>>>
>>>      
>> It wouldn't be hard to make this more effective either. The really scary
>> trojan *(whose name eludes me right now)*, managed to use effective
>> algorithmically generated domain names for its update download location.
>> And you can hide the packages files, even corrupt the debian packaging
>> system to stop it from knowing about all the files you've installed...
>>
>>    
> Are you referring to the Windows one, Conficker?
> 

Yes, that's the beasty. Also, storm had a command-and-control/update
method :)


-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.ubuntu.com/UKTeam/

Reply via email to