Web Hosting News

  Home arrow Web Hosting News arrow Page 3 - Hosted in China: Malware-Infested Web ...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

Hosted in China: Malware-Infested Web Sites
By: Terri Wells
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 3 stars3 stars3 stars3 stars3 stars / 2

    Table of Contents:
  • Hosted in China: Malware-Infested Web Sites
  • Changing Threats
  • Why Hackers Spread Malware
  • Protect Your System Online

  • Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article




    Hosted in China: Malware-Infested Web Sites - Why Hackers Spread Malware

    (Page 3 of 4 )

    Why do hackers spread malware in the first place? At one time they did it just for bragging rights, but nowadays there's more of a concern for the money. Many types of malware try to turn an infected PC into a "bot" or a "zombie" -- a machine that is controlled remotely by a malicious hacker for usually nefarious purposes. The hacker, also known as a "bot herder" because he may have hundreds or even thousands of these zombie PCs under his control, may use his bots for launching spam campaigns or distributed denial of service attacks (such as the one launched earlier this year against Estonian targets).

    Sometimes a spammer will actually hire a bot herder to launch a spam campaign. In that case, the bot herder isn't getting paid directly from the spam; he doesn't care what kind of spam is being sent. He is simply providing a service.

    Hackers will also steal information with their malware. By this I don't necessarily mean corporate secrets, though if they stumble across such items and know how to turn a profit on them, it's unlikely that such a criminal would hesitate. Genes notes that in a corporate environment, this kind of malware could threaten the company. "[G]uess what happens when the attacker sees a lot of documents or a lot of stuff that's confidential? He will try to sell it," Genes explains.

    I'm talking more about malware that installs a keylogger or other piece of software that spies on the PC's users. Such forms of spyware can steal user names and passwords for financial services sites, among others. A hacker armed with this kind of information can commit identity theft: empty a victim's bank account, run up huge bills on credit cards, even open accounts without the victim's knowledge.

    The change in focus from simply wreaking havoc to getting a financial "return on investment" is only practical. "Nowadays, the bad guys try to make money out of it," Genes said pointedly. "To make money they have to control something as long as possible. And they have to update it because the bot, after a certain amount of activity, gets outdated in about a week."

    More Web Hosting News Articles
    More By Terri Wells


    - FreedomPop Offering Open Wi-Fi Service
    - Go Daddy Goes to India
    - Netelligent, Savvis Add New Canadian Web Hos...
    - World IPv6 Launch Happens Today
    - IT Teams Struggle to Keep Pace with Malware
    - Lulz Security Hacks CIA, Takes Requests
    - Apple Unveils iCloud
    - Rackspace Introduces Cloud Load Balancers
    - Amazon Offers Cloud Drive, Disses Music Indu...
    - New Android.Pjapps Trojan
    - Copyright Fight over Hurt Locker Downloads I...
    - Data Reveals Many Browsers Remain Unpatched
    - PandaLabs Report - What Happens to Stolen In...
    - Safari Books Online Review
    - Hackers Targeting Human Rights Groups

    Developer Shed Affiliates


    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap