To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
----------
On Sun, Jan 21, 2007 at 12:18:49AM +0100, Peter Dambier wrote:
> At least one of our polititians gave us the clue
> about the programme attacking the router.

That's intriguing, and if the routers did use Linux that
would ease development significantly (or at least provide
a big pool of people skilled in developing for it).

> It is said (polititians) that every packet transmitted
> is also send to another place, not by the DSLAM but
> by the troyan because it has to work in foraign
> countries too. So to be invisible it has to double
> your DSL-bandwidth. People are looking for the api
> to switch bandwidth, hacking the software of the
> motorola and broadcom chips.

That would be far from stealthy; typically exfiltrating data
is the riskiest part of a program like this, because it's just
a matter of following the bits to the destination, and thus
potentially identifying the guilty parties.  However, a
government agency is more than capable of preventing most
people from being able to identify who is behind it.  Using
organized crime as a cover (for example, by having the data
sent to a computer in Eastern Europe) is actually fairly
clever, and not entire fiction if the groups operating there
to summarize and report on the intercepts don't have official
cover :-)

However, a typical home user wouldn't be able to monitor
the data going upstream of a DSL modem, since that's the
endpoint of their administrative control.  Clever.
-- 
``Unthinking respect for authority is the greatest enemy of truth.''
-- Albert Einstein -><- <URL:http://www.subspacefield.org/~travis/>

Attachment: pgp9D9Dpjnwbh.pgp
Description: PGP signature

_______________________________________________
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets

Reply via email to