by Mike Masnick
Mon, Sep 10th 2007 1:03pm
Over the last few years, we've all heard stories about how organized crime groups have taken to using botnets of "zombied" computers to run all sorts of scams and spam campaigns. ISPs have been somewhat slow to react. While they try to use fairly blunt instruments, like cutting off certain ports, many don't seem to have a very good process in place for tracking down and stopping customers whose machines have become unwitting members in a botnet. In fact, security researchers are growing frustrated that when they come across evidence of a hijacked computer, ISPs don't respond at all when told that a customer is causing trouble. There certainly are a few ISPs that are careful to help get rid of botnets, doing things like quarantining or cutting off certain users from their internet access until their machines are cleaned up, but most of the bigger ISPs don't appear to do very much at all. Of course, there is the other side of this story -- which is that when ISPs may be too proactive, it can often snag people whose machines aren't actually doing anything wrong. But, it certainly seems like completely ignoring reports with evidence of a botnet may be going to the opposite extreme.
If you liked this post, you may also be interested in...
- Copyright Industry Keeps Asking For More In Australia: VPN Ban Next?
- Flimsy Last Ditch Effort To Derail Real Net Neutrality Protections Launches In Congress
- Canada Preps Launch Of An Actually Mostly Sensible ISP Copyright Warning System
- Internet Provider Sonic's CEO: Title II Is Only A Regulatory Burden If You're Doing Something Bad
- That Didn't Take Long: UK MP Decides To Put The Blame For The Sony Hack On ISPs, Obviously