by Mike Masnick
Mon, Sep 10th 2007 1:03pm
Over the last few years, we've all heard stories about how organized crime groups have taken to using botnets of "zombied" computers to run all sorts of scams and spam campaigns. ISPs have been somewhat slow to react. While they try to use fairly blunt instruments, like cutting off certain ports, many don't seem to have a very good process in place for tracking down and stopping customers whose machines have become unwitting members in a botnet. In fact, security researchers are growing frustrated that when they come across evidence of a hijacked computer, ISPs don't respond at all when told that a customer is causing trouble. There certainly are a few ISPs that are careful to help get rid of botnets, doing things like quarantining or cutting off certain users from their internet access until their machines are cleaned up, but most of the bigger ISPs don't appear to do very much at all. Of course, there is the other side of this story -- which is that when ISPs may be too proactive, it can often snag people whose machines aren't actually doing anything wrong. But, it certainly seems like completely ignoring reports with evidence of a botnet may be going to the opposite extreme.
If you liked this post, you may also be interested in...
- How States Are Fighting To Keep Towns From Offering Their Own Broadband
- No, We Still Can't Definitively Prove Your ISP Is Slowing Netflix Traffic To Make An Extra Buck
- Hollywood Studios Call Six Strikes A 'Sham,' Cue Plans For Something Much Worse
- Canadian Law Enforcement Complains Child Molesters Are Benefiting Most From ISP Subscriber Data Warrant Requirements
- Copyright Industry Keeps Asking For More In Australia: VPN Ban Next?