by Mike Masnick
Mon, Sep 10th 2007 1:03pm
Over the last few years, we've all heard stories about how organized crime groups have taken to using botnets of "zombied" computers to run all sorts of scams and spam campaigns. ISPs have been somewhat slow to react. While they try to use fairly blunt instruments, like cutting off certain ports, many don't seem to have a very good process in place for tracking down and stopping customers whose machines have become unwitting members in a botnet. In fact, security researchers are growing frustrated that when they come across evidence of a hijacked computer, ISPs don't respond at all when told that a customer is causing trouble. There certainly are a few ISPs that are careful to help get rid of botnets, doing things like quarantining or cutting off certain users from their internet access until their machines are cleaned up, but most of the bigger ISPs don't appear to do very much at all. Of course, there is the other side of this story -- which is that when ISPs may be too proactive, it can often snag people whose machines aren't actually doing anything wrong. But, it certainly seems like completely ignoring reports with evidence of a botnet may be going to the opposite extreme.
If you liked this post, you may also be interested in...
- The FCC Has To Remind ISPs Not To Spend Taxpayer Subsidies On Booze, Trips To Disney World
- Sheldon Whitehouse Freaks Out, Blames 'Pro-Botnet Lobby' For Rejecting His Terrible CFAA Amendment
- Data Retention Rules Go Into Effect Down Under, But No One's Sure What's Going On
- How States Are Fighting To Keep Towns From Offering Their Own Broadband
- No, We Still Can't Definitively Prove Your ISP Is Slowing Netflix Traffic To Make An Extra Buck