%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 14 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240517040432+00'00') /ModDate (D:20240517040432+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 7722 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 74.242 521.469 672.492 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 74.242 l 565.984 74.242 l 565.984 745.984 l f 45.266 746.734 m 45.266 74.242 l 46.016 74.242 l 46.016 745.984 l f 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(ATTACK OF THE TROJANS, BOTS & ZOMBIES)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(Once of the most common questions we are asked by users is: How do these spammers get my e-mail address? )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(Previously we looked at )] TJ ET 0.373 0.169 0.255 rg BT 158.054 553.044 Td /F3 9.0 Tf [(Rumpelstiltskin )] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 158.054 551.893 m 221.063 551.893 l S 0.400 0.400 0.400 rg BT 221.063 553.044 Td /F3 9.0 Tf [(attacks and this week we will focus on the second of the methods)] TJ ET BT 481.190 553.044 Td /F4 9.0 Tf [( -  )] TJ ET BT 491.693 553.044 Td /F3 9.0 Tf [(by using )] TJ ET BT 61.016 542.055 Td /F3 9.0 Tf [(Trojan Horses, Bots and Zombies)] TJ ET BT 195.062 542.055 Td /F3 9.0 Tf [(. Now, thet may sound like something from a movie, but they do pose quite a serious )] TJ ET BT 61.016 531.066 Td /F3 9.0 Tf [(threat to you as e-mail user.)] TJ ET BT 61.016 511.077 Td /F3 9.0 Tf [(Let us use a familiar example. You regularly exchange emails with your elderly mother who has a computer. Your mother )] TJ ET BT 61.016 500.088 Td /F3 9.0 Tf [(uses Outlook or Thunderbird and has dozens of emails from you in her inbox. She even added you to her address book. )] TJ ET BT 61.016 489.099 Td /F3 9.0 Tf [(She also has lots of emails from a distant family member – cousin)] TJ ET BT 322.610 489.099 Td /F3 9.0 Tf [( )] TJ ET BT 325.112 489.099 Td /F3 9.0 Tf [(Johan from Australia. You haven’t stayed in touch with )] TJ ET BT 61.016 478.110 Td /F3 9.0 Tf [(Johan that closely over the years, but you definitely know who he is.)] TJ ET BT 61.016 458.121 Td /F3 9.0 Tf [(Last year, just before the Christmas, Johan downloaded and installed this really pretty Christmas screensaver that showed )] TJ ET BT 61.016 447.132 Td /F3 9.0 Tf [(tranquil tree and candle scenes when he wasn’t using the computer. What he didn’t know was that the screen saver had a )] TJ ET BT 61.016 436.143 Td /F3 9.0 Tf [(sinister hidden payload. While the candles flickered peacefully on his screen, the software went to work combing through )] TJ ET BT 61.016 425.154 Td /F3 9.0 Tf [(his emails and address book, his browser’s cache of past webmail sessions and other files, storing every email address it )] TJ ET BT 61.016 414.165 Td /F3 9.0 Tf [(would find in a separate list.)] TJ ET BT 61.016 394.176 Td /F3 9.0 Tf [(Then it sent the entire list to a server in Russia, where a criminal combined it with other such submissions to build the )] TJ ET BT 61.016 383.187 Td /F3 9.0 Tf [(ultimate monster spam list that can be sold and resold over and over again.)] TJ ET BT 61.016 363.198 Td /F3 9.0 Tf [(But as if that wasn’t enough, when the “screensaver” sent the address list to Russia, it received some content in return – )] TJ ET BT 61.016 352.209 Td /F3 9.0 Tf [(messages to be sent to all of Johan’s contacts. Then, unbeknownst to John, his computer started creating hundreds of )] TJ ET BT 61.016 341.220 Td /F3 9.0 Tf [(emails randomly using the harvested email addresses in the To: and From: field along with the content from the Russian )] TJ ET BT 61.016 330.231 Td /F3 9.0 Tf [(server and sent them out using Johan’s Internet connection. One of them used your mother’s email address as sender )] TJ ET BT 61.016 319.242 Td /F3 9.0 Tf [(and yours as recipient.)] TJ ET BT 61.016 299.253 Td /F3 9.0 Tf [(Now you received some spam from your mother asking you to buy fake watches and you’re ready to speak to her telling )] TJ ET BT 61.016 288.264 Td /F3 9.0 Tf [(her to stop. Well, don’t. Your mother has obviously nothing to do with the whole thing and you’ll never find out that it was )] TJ ET BT 61.016 277.275 Td /F3 9.0 Tf [(actually Johan’s computer.)] TJ ET BT 61.016 257.286 Td /F3 9.0 Tf [(You just had a look into the really nasty underworld of the Internet where )] TJ ET BT 352.166 257.286 Td /F4 9.0 Tf [(botmasters )] TJ ET BT 403.178 257.286 Td /F3 9.0 Tf [(\(the guy in Russia\) control )] TJ ET BT 510.215 257.286 Td /F4 9.0 Tf [(botnets)] TJ ET BT 542.714 257.286 Td /F3 9.0 Tf [( )] TJ ET BT 61.016 246.297 Td /F3 9.0 Tf [(\(infected computers that all report to the same server\) of remote-controlled )] TJ ET BT 360.131 246.297 Td /F4 9.0 Tf [(zombies)] TJ ET BT 396.140 246.297 Td /F3 9.0 Tf [( \(Johan’s computer\) that were )] TJ ET BT 61.016 235.308 Td /F3 9.0 Tf [(compromised using )] TJ ET BT 141.539 235.308 Td /F4 9.0 Tf [(trojan horses)] TJ ET BT 198.554 235.308 Td /F3 9.0 Tf [( \(the screensaver\) or similar )] TJ ET BT 312.575 235.308 Td /F4 9.0 Tf [(malware)] TJ ET BT 348.593 235.308 Td /F3 9.0 Tf [(.)] TJ ET BT 61.016 215.319 Td /F3 9.0 Tf [(And it doesn’t even end there. The botmaster typically doesn’t spam for his own account but hires out his botnet to )] TJ ET BT 61.016 204.330 Td /F3 9.0 Tf [(whoever pays the most. The equally shady factory in China wanting to sell more fake Rolexes can now hire the botmaster )] TJ ET BT 61.016 193.341 Td /F3 9.0 Tf [(to blast their offers all over the internet. The guy in Russia doesn’t even care if you open or click on that email from your )] TJ ET BT 61.016 182.352 Td /F3 9.0 Tf [(mother, he gets paid either way. And when he’s done with the watches, he’ll inform his entire mailing list that they all won )] TJ ET BT 61.016 171.363 Td /F3 9.0 Tf [(the lottery and can pick up the prize if only they pay a small “transfer fee” up front. And after that, he’ll mail a Paypal phish )] TJ ET BT 61.016 160.374 Td /F3 9.0 Tf [(for yet another “client”. And for good measure, he’ll sell his entire email address database, incl. yours, to a friend who is in )] TJ ET BT 61.016 149.385 Td /F3 9.0 Tf [(the same line of “business”.)] TJ ET BT 61.016 129.396 Td /F3 9.0 Tf [(In other words, once your email address got picked up by a )] TJ ET BT 299.129 129.396 Td /F4 9.0 Tf [(botnet)] TJ ET BT 326.624 129.396 Td /F3 9.0 Tf [(, Pandora’s Box is wide open. The whole scheme is )] TJ ET BT 61.016 118.407 Td /F3 9.0 Tf [(particularly wicked because now you have to depend on others to keep your address safe. Unfortunately, there is little you )] TJ ET BT 61.016 107.418 Td /F3 9.0 Tf [(can do:)] TJ ET 0.400 0.400 0.400 RG 85.866 90.245 m 85.866 90.658 85.696 91.067 85.404 91.359 c 85.113 91.651 84.703 91.820 84.291 91.820 c 83.878 91.820 83.469 91.651 83.177 91.359 c 82.885 91.067 82.716 90.658 82.716 90.245 c 82.716 89.833 82.885 89.423 83.177 89.132 c 83.469 88.840 83.878 88.670 84.291 88.670 c 84.703 88.670 85.113 88.840 85.404 89.132 c 85.696 89.423 85.866 89.833 85.866 90.245 c f BT 91.016 87.429 Td /F3 9.0 Tf [(First of all, do your own share: )] TJ ET BT 214.064 87.429 Td /F4 9.0 Tf [(NEVER open email attachments)] TJ ET BT 350.099 87.429 Td /F3 9.0 Tf [( that you didn’t ask for, even if they appear to )] TJ ET BT 91.016 76.440 Td /F3 9.0 Tf [(come from good friends like Johan. If you’re still curious, ask Johan or your mother first if they really sent it.)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 158.0537 552.2116 221.0627 561.3691 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/2013/08/16/how-do-spammers-get-your-e-mail-address-part-1-rumplestiltskin-attack/) >> endobj 14 0 obj << /Type /Page /Parent 3 0 R /Annots [ 16 0 R ] /Contents 15 0 R >> endobj 15 0 obj << /Length 5120 >> stream 0.400 0.400 0.400 rg 0.400 0.400 0.400 RG 0.18 w 0 J [ ] 0 d 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 551.899 521.469 206.085 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 551.899 m 566.734 551.899 l 565.984 552.649 l 46.016 552.649 l f 566.734 757.984 m 566.734 551.899 l 565.984 552.649 l 565.984 757.984 l f 45.266 757.984 m 45.266 551.899 l 46.016 552.649 l 46.016 757.984 l f 0.400 0.400 0.400 rg 0.400 0.400 0.400 RG 85.866 752.009 m 85.866 752.422 85.696 752.831 85.404 753.123 c 85.113 753.415 84.703 753.584 84.291 753.584 c 83.878 753.584 83.469 753.415 83.177 753.123 c 82.885 752.831 82.716 752.422 82.716 752.009 c 82.716 751.597 82.885 751.187 83.177 750.896 c 83.469 750.604 83.878 750.434 84.291 750.434 c 84.703 750.434 85.113 750.604 85.404 750.896 c 85.696 751.187 85.866 751.597 85.866 752.009 c f BT 91.016 749.193 Td /F4 9.0 Tf [(NEVER download anything)] TJ ET BT 206.531 749.193 Td /F3 9.0 Tf [( where you can’t in­de­pend­ent­ly verify it’s safe. With)] TJ ET BT 422.603 749.193 Td /F3 9.0 Tf [(“independently verify”)] TJ ET BT 508.634 749.193 Td /F3 9.0 Tf [( I mean )] TJ ET BT 91.016 738.204 Td /F3 9.0 Tf [(you can read about it in forums, blogs, news sites, your local “computer geek” etc. Facebook fan pages, even with )] TJ ET BT 91.016 727.215 Td /F3 9.0 Tf [(1000s of “fans”, do NOT count, they are way too easy to manipulate and are usually full of misinformation!)] TJ ET 85.866 719.042 m 85.866 719.455 85.696 719.864 85.404 720.156 c 85.113 720.448 84.703 720.617 84.291 720.617 c 83.878 720.617 83.469 720.448 83.177 720.156 c 82.885 719.864 82.716 719.455 82.716 719.042 c 82.716 718.630 82.885 718.220 83.177 717.929 c 83.469 717.637 83.878 717.467 84.291 717.467 c 84.703 717.467 85.113 717.637 85.404 717.929 c 85.696 718.220 85.866 718.630 85.866 719.042 c f BT 91.016 716.226 Td /F4 9.0 Tf [(NEVER get fooled by fake)] TJ ET BT 201.041 716.226 Td /F3 9.0 Tf [( )] TJ ET BT 203.543 716.226 Td /F4 9.0 Tf [(“security scans”)] TJ ET BT 275.075 716.226 Td /F3 9.0 Tf [( )] TJ ET BT 277.577 716.226 Td /F3 9.0 Tf [(\(they’re quite the opposite!\))] TJ ET BT 386.630 716.226 Td /F3 9.0 Tf [( or)] TJ ET BT 397.133 716.226 Td /F3 9.0 Tf [(“video codec updates”)] TJ ET BT 485.675 716.226 Td /F3 9.0 Tf [( to see that )] TJ ET BT 91.016 705.237 Td /F3 9.0 Tf [(funny kitten clip. If you think you need a new Flash player, type in flash.com by hand and update from there. If )] TJ ET BT 91.016 694.248 Td /F3 9.0 Tf [(afterwards the site still says you need an)] TJ ET BT 253.088 694.248 Td /F3 9.0 Tf [( “update”)] TJ ET BT 289.106 694.248 Td /F3 9.0 Tf [( get out of there as fast as you can.)] TJ ET 85.866 686.075 m 85.866 686.488 85.696 686.897 85.404 687.189 c 85.113 687.481 84.703 687.650 84.291 687.650 c 83.878 687.650 83.469 687.481 83.177 687.189 c 82.885 686.897 82.716 686.488 82.716 686.075 c 82.716 685.663 82.885 685.253 83.177 684.962 c 83.469 684.670 83.878 684.500 84.291 684.500 c 84.703 684.500 85.113 684.670 85.404 684.962 c 85.696 685.253 85.866 685.663 85.866 686.075 c f BT 91.016 683.259 Td /F3 9.0 Tf [(Then )] TJ ET BT 114.029 683.259 Td /F4 9.0 Tf [(educate your friends and family)] TJ ET BT 249.569 683.259 Td /F3 9.0 Tf [( about the same. Explain how trojans work. Send them a link to this blog )] TJ ET BT 91.016 672.270 Td /F3 9.0 Tf [(page!)] TJ ET 85.866 664.097 m 85.866 664.510 85.696 664.919 85.404 665.211 c 85.113 665.503 84.703 665.672 84.291 665.672 c 83.878 665.672 83.469 665.503 83.177 665.211 c 82.885 664.919 82.716 664.510 82.716 664.097 c 82.716 663.685 82.885 663.275 83.177 662.984 c 83.469 662.692 83.878 662.522 84.291 662.522 c 84.703 662.522 85.113 662.692 85.404 662.984 c 85.696 663.275 85.866 663.685 85.866 664.097 c f BT 91.016 661.281 Td /F3 9.0 Tf [(You can try having )] TJ ET BT 168.056 661.281 Td /F4 9.0 Tf [(multiple private email addresses)] TJ ET BT 307.115 661.281 Td /F3 9.0 Tf [(. Keep a super-private one, only for family and very few of )] TJ ET BT 91.016 650.292 Td /F3 9.0 Tf [(your closest friends.)] TJ ET BT 171.044 650.292 Td /F3 9.0 Tf [( )] TJ ET BT 173.546 650.292 Td /F3 9.0 Tf [( Use your university address for everyone you work with and don’t use this for private mail – )] TJ ET BT 91.016 639.303 Td /F3 9.0 Tf [(EVER!  Get a semi-private one for your wider social circle. The latter two do get some spam, although it’s still )] TJ ET BT 91.016 628.314 Td /F3 9.0 Tf [(manageable. )] TJ ET BT 145.547 628.314 Td /F3 9.0 Tf [(GMail has a very good “spam filter”, and blacklisting spammers is very easy!)] TJ ET BT 61.016 608.325 Td /F3 9.0 Tf [( )] TJ ET BT 278.905 588.336 Td /F3 9.0 Tf [([ARTICLE BY DAVID WILES & MATERIAL BY )] TJ ET 0.373 0.169 0.255 rg BT 467.464 588.336 Td /F3 9.0 Tf [(BustSpammers.com)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 467.464 587.185 m 548.482 587.185 l S 0.400 0.400 0.400 rg BT 548.482 588.336 Td /F3 9.0 Tf [(])] TJ ET BT 61.016 569.847 Td /F3 9.0 Tf [(Posted in:E-mail,Security | Tagged:Bank Emails,Bots,Malware,Trojan,Zombies | With 1 comments)] TJ ET endstream endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 467.4643 587.5036 548.4823 596.6611 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://www.bustspammers.com/still-get-spam-how-got-address.html) >> endobj xref 0 18 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000312 00000 n 0000000341 00000 n 0000000476 00000 n 0000000558 00000 n 0000008332 00000 n 0000008444 00000 n 0000008551 00000 n 0000008667 00000 n 0000008787 00000 n 0000008915 00000 n 0000009074 00000 n 0000009158 00000 n 0000014331 00000 n 0000014459 00000 n trailer << /Size 18 /Root 1 0 R /Info 5 0 R >> startxref 14574 %%EOF Attack of the trojans, bots & zombies « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Attack of the trojans, bots & zombies

Once of the most common questions we are asked by users is: How do these spammers get my e-mail address? Previously we looked at Rumpelstiltskin attacks and this week we will focus on the second of the methods –  by using Trojan Horses, Bots and Zombies. Now, thet may sound like something from a movie, but they do pose quite a serious threat to you as e-mail user.

Let us use a familiar example. You regularly exchange emails with your elderly mother who has a computer. Your mother uses Outlook or Thunderbird and has dozens of emails from you in her inbox. She even added you to her address book. She also has lots of emails from a distant family member – cousin Johan from Australia. You haven’t stayed in touch with Johan that closely over the years, but you definitely know who he is.

Last year, just before the Christmas, Johan downloaded and installed this really pretty Christmas screensaver that showed tranquil tree and candle scenes when he wasn’t using the computer. What he didn’t know was that the screen saver had a sinister hidden payload. While the candles flickered peacefully on his screen, the software went to work combing through his emails and address book, his browser’s cache of past webmail sessions and other files, storing every email address it would find in a separate list.

Then it sent the entire list to a server in Russia, where a criminal combined it with other such submissions to build the ultimate monster spam list that can be sold and resold over and over again.

But as if that wasn’t enough, when the “screensaver” sent the address list to Russia, it received some content in return – messages to be sent to all of Johan’s contacts. Then, unbeknownst to John, his computer started creating hundreds of emails randomly using the harvested email addresses in the To: and From: field along with the content from the Russian server and sent them out using Johan’s Internet connection. One of them used your mother’s email address as sender and yours as recipient.

Now you received some spam from your mother asking you to buy fake watches and you’re ready to speak to her telling her to stop. Well, don’t. Your mother has obviously nothing to do with the whole thing and you’ll never find out that it was actually Johan’s computer.

You just had a look into the really nasty underworld of the Internet where botmasters (the guy in Russia) control botnets (infected computers that all report to the same server) of remote-controlled zombies (Johan’s computer) that were compromised using trojan horses (the screensaver) or similar malware.

And it doesn’t even end there. The botmaster typically doesn’t spam for his own account but hires out his botnet to whoever pays the most. The equally shady factory in China wanting to sell more fake Rolexes can now hire the botmaster to blast their offers all over the internet. The guy in Russia doesn’t even care if you open or click on that email from your mother, he gets paid either way. And when he’s done with the watches, he’ll inform his entire mailing list that they all won the lottery and can pick up the prize if only they pay a small “transfer fee” up front. And after that, he’ll mail a Paypal phish for yet another “client”. And for good measure, he’ll sell his entire email address database, incl. yours, to a friend who is in the same line of “business”.

In other words, once your email address got picked up by a botnet, Pandora’s Box is wide open. The whole scheme is particularly wicked because now you have to depend on others to keep your address safe. Unfortunately, there is little you can do:

  • First of all, do your own share: NEVER open email attachments that you didn’t ask for, even if they appear to come from good friends like Johan. If you’re still curious, ask Johan or your mother first if they really sent it.
  • NEVER download anything where you can’t in­de­pend­ent­ly verify it’s safe. With“independently verify” I mean you can read about it in forums, blogs, news sites, your local “computer geek” etc. Facebook fan pages, even with 1000s of “fans”, do NOT count, they are way too easy to manipulate and are usually full of misinformation!
  • NEVER get fooled by fake “security scans” (they’re quite the opposite!) or“video codec updates” to see that funny kitten clip. If you think you need a new Flash player, type in flash.com by hand and update from there. If afterwards the site still says you need an “update” get out of there as fast as you can.
  • Then educate your friends and family about the same. Explain how trojans work. Send them a link to this blog page!
  • You can try having multiple private email addresses. Keep a super-private one, only for family and very few of your closest friends.  Use your university address for everyone you work with and don’t use this for private mail – EVER!  Get a semi-private one for your wider social circle. The latter two do get some spam, although it’s still manageable. GMail has a very good “spam filter”, and blacklisting spammers is very easy!

 

[ARTICLE BY DAVID WILES & MATERIAL BY BustSpammers.com]

Tags: , , , ,

One Response to “Attack of the trojans, bots & zombies”

  1. Jeanne says:

    Thank you very much. This will help me a great deal.

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.