Trojans as spam robots: the evidence
I've suspected this based on the evidence I've seen from infected machines, but I always assumed that the virus writer was in the direct employ of the spammer, not that a "market" for lists of compromised machine IP's had developed.
Security experts and spam fighters have always assumed that spammers use Trojans to turn home workstations into unwitting hosts or zombies in pornography and spam distribution rings. Not only can these techniques be used to bypass IP address blacklists, but also to launch DoS attacks.
(link) [The Register]
/Technology | 0 writebacks | permanent link
comment...