Mitigate botnets in five steps

It sounds like it could be an upcoming movie release -- maybe a knock-off of War of the Worlds. Unfortunately for home computer users and company security administrators alike, this invasion is real and the first wave has already landed.

In its original form, a bot is not malicious software. Bot code was created to automate the maintenance and administration of IRC (Internet Relay Chat) channels. Eventually though, more malicious developers figured out that bot code could also be used to quietly infiltrate unsuspecting computer systems and provide a means of hijacking or controlling those machines to perform other malicious tasks.

Bot code makes its way onto computer systems in a variety of ways. Users that visit IRC chat rooms or Web sites of a questionable nature are at a higher risk of becoming infected by bots. Some bots, such as the variants of Agobot (an IRC-controlled backdoor with network spreading capabilities), also spread themselves in the form of a network share and peer-to-peer file-sharing network worm. Mitigate botnets in five steps

Linked by shanmuga Saturday, 26th August 2006 3:50AM