To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
----------
Unfortunately this isn’t all that surprising.


On 4/16/07 2:25 PM, "Security Admin (NetSec)" <[EMAIL PROTECTED]>
wrote:

> To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
> ----------
> 
> Zombies infiltrate US military networks
> Behind the lines
> By John Leyden and Dan Goodin
> <http://forms.theregister.co.uk/mail_author/?story_url=/2007/04/16/military_bo
> tnet/>  → More by this author
> <http://search.theregister.co.uk/?author=John%20Leyden>
> Published Monday 16th April 2007 12:26 GMT
> Like this story? Receive others like it in your inbox
> <http://ad.doubleclick.net/clk;89491168;13533154;o?http://elreg.regaccount.com
> /register/?product=theregister_newsletter&amp;r=http://www.theregister.co.uk/?
> source=H200703NEWSLETTER>  Find your perfect job - click here from thousands
> of tech vacancies
> <http://ad.doubleclick.net/clk;39093442;13533154;c?http://www.jobsite.co.uk/>
> Security researchers have traced spam-sending botnet clients back to networks
> run by the US military.
> 
> Support Intelligence, the firm whose research on honeynets revealed that the
> networks of at least 28 Fortune 1000 companies contained malware-infected
> spam-spewing PCs, has found evidence of bots running behind military networks.
> 
>  
> <http://ad.uk.doubleclick.net/jump/reg.security.4159/front;dcove=d;sz=336x280;
> tile=3;ord=9llR4tRk6jcAADA23i0AAADR?>
> Rick Wesson, chief exec of Support Intelligence, said the firm's honeynet
> system has received Viagra spam from an IP address owned by the Randolph
> Airforce base. Support Intelligence has also observed bots - running IP
> addresses owned by the Directorate of Information Management - trying to
> connect to botnet command and control servers, evidence that PCs run by the
> directorate have become spam proxies under the control of hackers.
> 
> Most security experts associate malware-infected PCs that form the zombie
> components of botnet networks with careless consumers. The work of Support
> Intelligence suggests that large IT firms, including HP and Oracle, as well as
> the US military, are also partly responsible for the deluge of stock offer
> scams, penis pill offers, and other assorted tat that deluges surfers' inboxes
> every day.
> 
> The misuse of US military networks by spammers and other pond life is
> infrequently reported, but goes back some years. In August 2004, we reported
> how blog comment spams promoting illegal porn sites were sent through
> compromised machines associated with unclassified US military networks. Spam
> advertising "incest, rape and animal sex" pornography was posted on a web log
> which was set up to discuss the ID Cards Bill via an open proxy at the gateway
> of an unclassified military network. ®
> 
>  
> 
> 


-- 

Regards, 
    Adriel T. Desautels
    Chief Technology Officer - Netragard, LLC
    Office: 617-934-0269 || Mobile : 857-636-8882
    http://www.linkedin.com/pub/1/118/a45
    http://www.netragard.com
    -------------------------
    "We make IT secure."

Attachment: image.gif
Description: GIF image

_______________________________________________
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets

Reply via email to