Microsoft Hunts For Zombie Spammers - InformationWeek
IoT
IoT
News
News
10/27/2005
03:18 PM
50%
50%

Microsoft Hunts For Zombie Spammers

Microsoft is investigating 13 spam operations as part of a call to action against zombies, which are compromised computers used without their owners' permission to send spam, launch denial-of-service (DoS) attacks, and spread worms and viruses.

Microsoft is investigating 13 spam operations it believes sent millions of junk mail messages through a single PC that the Redmond, Wash.-based developer purposefully set up as a "zombie," the company said Thursday.

Microsoft's action, which was done in conjunction with the Federal Trade Commission (FTC) and Consumer Action, a San Francisco-based advocacy group, was part of a call to arms against zombies, compromised computers that are used without their owners' permission to send spam, launch denial-of-service (DoS) attacks, and spread worms and viruses.

"The widespread use of zombie computers to commit crimes over the Internet presents a very real danger to law-abiding computer users," said Tim Cranton, the director of Microsoft's Internet Safety division.

Earlier this year, Cranton said, Microsoft set up a "clean" PC, then infected it with malicious code commonly used by attackers to turn a computer into a zombie. Researchers then monitored the PC's use of the Internet for 20 days, and tallied the number of messages sent through it.

"In those 20 days, this one computer received 5 million connection requests from spammers, and sent 18 million spam messages," said Cranton.

That amount of data was impossible to analyze, so Microsoft focused on the three most-active spamming days, when 470,00 connection requests were made of the PC, and about 1.8 million messages were sent through it.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
2018 State of the Cloud
2018 State of the Cloud
Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!
News
Don't Collect Biometric Data Without Providing Notice
Lisa Morgan, Freelance Writer,  2/1/2019
Commentary
AI and the Next Recession
Guest Commentary, Guest Commentary,  1/24/2019
Commentary
The Title Machine Learning Engineer Will Start to Disappear
Guest Commentary, Guest Commentary,  2/7/2019
Register for InformationWeek Newsletters
Video
Current Issue
Security and Privacy vs. Innovation: The Great Balancing Act
This InformationWeek IT Trend Report will help you better understand and address the growing challenge of balancing the need for innovation with the real-world threats and regulations.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll