Sony DRM Rootkit, nothing more needs to be said!<br><br><div><span class="gmail_quote">On 10/4/07, <b class="gmail_sendername">Karl Schuttler</b> <<a href="mailto:rexykik@gmail.com">rexykik@gmail.com</a>> wrote:</span>
<blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">Just a little wink wink,<br><br>"With Windows you practically need to inject a VNC server process just to do
<br>anything useful. Plus, the rootkits are a bit easier to install and use<br>(easier to hide processes, network connections, etc.) in Linux I think,<br>or at least more mature."<br><br>Botnets aren't controlled over VNC, they are typically controlled over
<br>an IRC server. If you were to botnet over VNC, you would have to do<br>tasks individually with each computer. The whole advantage of<br>botnetting is being able to use all the computers' power at the same<br>time.
<br><br>I definitely agree, however, that owning a linux box would be more<br>satisfying than a windows box. But rootkits aren't that difficult to<br>get owned by in windows, and certainly not easier to install than in
<br>windows; look at back oriface and the success it had. Installing in<br>Windows would probably be easier, seeing that privilege escalation is<br>much simpler in a windows environment. I don't know about the level of
<br>maturity that you mean, but a lot of these backdoor softwares are self<br>propagating. Furthermore, a lot of the zombies in the bot nets aren't<br>going to be used for server hosts themselves, but are more likely to
<br>be using mail clients to mail bomb spam to people in order to get them<br>to visit the web server of the phishers.<br><br>Having a botnet and writing malware for exploiting flaws isn't<br>something that just the hobby hacker is doing anymore, it is an
<br>industry that has great payoff, and with anonymity services like Tor,<br>pretty simple to keep from getting caught. Keep in mind that people<br>are being paid to professionally develop this malware.<br><br>And yes, of course they are going to use linux for some aspects,
<br>probably to develop in, host some of their services like the irc<br>server, or the webservers they need to put up a phishing site. I think<br>the difference is that most of the zombies probably aren't linux, but<br>
more of the upper management is.<br><br>Karl<br><br>On 10/4/07, Michael Rudas <<a href="mailto:audiotech50@gmail.com">audiotech50@gmail.com</a>> wrote:<br>> Mark Lachniet wrote:<br>><br>> > I'm not sure its FUD really. The source seems credible, despite the
<br>> > venue of the statement (Microsoft's conference). But, when you think of<br>> > it, what would YOU rather hack.<br>><br>> But, again, the presentation is titled ("eBay phishers use Linux
<br>> botnets")-- and framed ("Phishers are getting more organized and tend<br>> to exploit hacked Linux boxes more than Windows, according to eBay's<br>> security chief.") as though the Linux boxen WERE some sort of
<br>> sooper-seekrit botnet in-and-of themselves.<br>><br>> Deliberate lies and distortion are being used to obscure the truth--<br>> which is the very DEFINITION of FUD.<br>> _______________________________________________
<br>> linux-user mailing list<br>> <a href="mailto:linux-user@egr.msu.edu">linux-user@egr.msu.edu</a><br>> <a href="http://mailman.egr.msu.edu/mailman/listinfo/linux-user">http://mailman.egr.msu.edu/mailman/listinfo/linux-user
</a><br>><br>_______________________________________________<br>linux-user mailing list<br><a href="mailto:linux-user@egr.msu.edu">linux-user@egr.msu.edu</a><br><a href="http://mailman.egr.msu.edu/mailman/listinfo/linux-user">
http://mailman.egr.msu.edu/mailman/listinfo/linux-user</a><br></blockquote></div><br><br clear="all"><br>-- <br>Running Linux? Are you completely out of your mind. That thing is a rip-off. It comes with no viruses, no Trojans, no malware , etc .......