Yes, the whole concept of researchers hijacking malware is fascinating,
especially since they did it by registering unregistered domains, and then
spoofing as a C & C servers.  It's a precarious ethical quandry.

The Torpig is a Windows botnet.
http://www.sophos.com/security/analyses/viruses-and-spyware/trojtorpiga.html

Linux (and Mac) however are also adversely affected by botnets:

http://lwn.net/Articles/222153/

On Tue, May 5, 2009 at 7:38 AM, Stephen P Rufle <stephen.p.ru...@cox.net>wrote:

>
> http://www.pcpro.co.uk/news/252353/hijacked-botnet-exposes-startling-online-habits.html
>
> Thought it was interesting in regards to security. I did not read the
> pdf linked in the article, but it would be interesting to know what the
> breakdown by OS is :). Or does it even matter if most info is actually
> gotten through website exploits of some type.
> ---------------------------------------------------
> PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
> To subscribe, unsubscribe, or to change your mail settings:
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
>



-- 
www.obnosis.com (503)754-4452
"Contradictions do not exist." A. Rand
---------------------------------------------------
PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss

Reply via email to