Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: short Botnet list and Cashing in on DoS

  • From: Gadi Evron
  • Date: Sat Oct 09 16:15:51 2004


From a recent email I gather this is very off-topic, so I will try to be brief in my reply.

(Geneva.CH.EU.*) since 3+ years. I can say from my experiences I couldn't
make any kind of communication between botnets and spam. Most Trojan codes I
have looked into doesn't have any command/action to make users send spam
emails and such however they try infecting others by different ways that
port 25 can't avoid.
Short answer:
Many of the infected systems have more Trojan horses installed than the original infecting agent. Many Trojan horses have spam-sending or relaying capabilities.. or even just anonymity capabilities or ID theft/DDoS options. Thing is, there are always more options that can be later installed.

As to you not seeing them.. I suppose it's as simple as you not seeing enough of them.. count your blessings.

Gadi.




Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.