Storm Worm turns one

,----[ Quote ]
| Compromised machines, however they are infected, become zombie clients under
| the control of hackers.
`----

http://www.theregister.co.uk/2008/01...m_worm_botnet/

Mexico and Africa to become malware hotspots

,----[ Quote ]
| The former Soviet Republic, China and Southern America have been hotspots of
| malware creation since around 2003, when malware for profit replaced mischief
| as a motive for creating computer viruses. Each of the regions contained
| individuals with sophisticated computing skills but without the job
| opportunities to make a living for themselves in the IT sector.
`----

http://www.theregister.co.uk/2008/01...rime_hotspots/


Related:

In zombies we trust

,----[ Quote ]
| A little over a year ago, I wrote an editorial where in back-of-the-envelope
| style (.pdf) I estimated that perhaps 15-30% of all privately owned computers
| were no longer under the sole control of their owner. In the intervening
| months, I received a certain amount of hate mail but in those intervening
| months Vint Cert guessed 20-40%, Microsoft said 2/3rds, and IDC suggested
| 3/4ths. It is thus a conservative risk position to assume that any random
| counterparty stands a fair chance of being already compromised.
`----

http://blogs.zdnet.com/security/?p=661


Botnet 'pandemic' threatens to strangle the net

,----[ Quote ]
| Cerf estimated that between 100 million and 150 million of the
| 600 million PCs on the internet are under the control of hackers,
| the BBC reports. "Despite all that, the net is still working,
| which is pretty amazing. It's pretty resilient," he said.
`----

http://www.theregister.co.uk/2007/01/26/botnet_threat/


Russian malware storm brewing?

,----[ Quote ]
| Chenghuai Lu, a senior threat analyst at the Tokyo-based antivirus vendor,
| recently uncovered a site with several hundred malicious programs and traced
| the site's server to a Russian IP address. Among the harbored malware were
| examples of three Trojan families: Dropper.cko, Clicker.qu and Polycrypt.g.
| All three clans typically hijack Internet Explorer on compromised PCs and
| direct users to adult Web sites. * *
`----

http://www.linuxworld.com.au/index.p...644396&rid=-50


Microsoft is the world's biggest cause of zombie remailers

,----[ Quote ]
| In China, it would take about one and one-half years wages (for the
| average Chinese) to buy a legitimate copy of Windows Vista. If you
| could find it here.
|
| Microsoft is the biggest cause of zombie remailers in the world,
| because they make noises, but do not do anything to address the
| real digital inequities in the world.
`----

http://www.theinquirer.net/default.aspx?article=38202