Page last updated at 11:12 GMT, Thursday, 18 March 2010

Spammers survive botnet shutdowns

Spam in e-mail inbox, BBC
Most spam now travels via a botnet of hijacked PCs.

Spam levels have not been dented by a series of strikes against controllers of networks of hijacked computers.

Early 2010 has seen four such networks, or botnets, tackled via arrests, net access cutoffs and by infiltrating command systems.

The successes have not inconvenienced hi-tech criminals who found other routes to send spam, say experts.

And, they add, despite falling response rates, spam remains too lucrative for criminals to abandon.

Cable cutting

In early March, many parts of the command and control (C&C) system for the Zeus botnet were knocked out of action as Cisco and others cut off the Kazakhstani ISP being used to administer it.

The action comes on top of similar success against the Lethic, Waledac and Marioposa botnets in early 2010.

STAYING SAFE ONLINE
Use anti-spyware and anti-virus programs
On at least a weekly basis update anti-virus and spyware products
Install a firewall and make sure it is switched on
Make sure updates to your operating system are installed
Take time to educate yourself and family about the risks
Monitor your computer and stay alert to threats

"So as far as impact on spam goes it has been minimal," said Rik Ferguson, a senior security analyst at Trend Micro.

Statistics on spam and botnet numbers in the UK gathered by Trend Micro show that the rates of both have stayed constant despite the growing numbers of successes against these networks of hijacked home PCs.

Victims, typically users of Windows machines, often fall victim via booby-trapped e-mail messages or through websites that slip malware onto computers via software vulnerabilities.

Botnet controllers have shown resilience in recovering swiftly after a shutdown. 2008 saw the close down of an ISP called McColo which provided net connections for many botnets. As a result of that, global spam levels dropped by 70% but it did not take long for junk mail levels to start climbing again.

Similarly, the recent action against the Zeus botnet briefly caused the number of C&C computers behind it dropping by a quarter. Since then, however, numbers have been climbing and the network is closing in on its earlier total.

The problem, say experts, is that those who send spam are not those that run the botnets. As a result, if one botnet disappears then spammers and other hi-tech criminals simply shop around for another.

Cashing in

Hi-tech criminals persist with spam despite evidence that response rates are plummeting.

Only 28 responses were recorded from a spam campaign of 350 million e-mails found a study carried out by Professor Stefan Savage and colleagues at the University of California, San Diego.

Of those 350 million, only 23.8% made it through spam filters to e-mail inboxes and resulted in more than 10,000 visits to site peddling cheap pills.

Pills, BBC
Spam is not all about peddling cheap pills anymore

Professor Savage said it was difficult to draw conclusions based on its limited data but said even with response rates of 0.00001%, the most prolific spammers could potentially make millions of dollars per year.

"It is true that over the years spam campaigns have become less successful for certain age demographics in the USA and most of Europe, but not so much in Asia and developing countries." said Paul Sop, chief technology officer at security firm Prolexic.

"What counts is not the amount of spam being sent, but how profitable/effective the campaign is," he said. "Smaller more targeted spam campaigns, especially phishing, are more effective."

Mr Ferguson from Trend Micro said low response rates did not mean that spam had become a solved problem in some countries.

"Spam is not just about selling spurious bargains anymore," he said. Typically, he said, spam was the trigger that led people to a website where they may fall victim to some kind of malware.

"Most non-commercial spam these days is aimed solely to get you to click on a link, even out of curiosity," he said. "As soon as you click on that link, you're infected, most likely to become yet another botnet victim, have your identity and information stolen and go on to participate, all unknowingly in the infection of further victims."



Print Sponsor


SEE ALSO
Hacktivists turn to web attacks
10 Feb 10 |  Technology
US cuts off 'criminal' net firm
05 Jun 09 |  Technology
Game firm pursues virtual thieves
30 Nov 09 |  Technology
How I helped nail the 'manhood' spammer
02 Dec 09 |  Magazine
Botnet 'ensnares government PCs'
21 Apr 09 |  Technology
Spam 'produces 17m tons of CO2'
16 Apr 09 |  Technology
'Boom year' for hi-tech criminals
28 Dec 08 |  Technology

RELATED INTERNET LINKS
The BBC is not responsible for the content of external internet sites


FEATURES, VIEWS, ANALYSIS
Has China's housing bubble burst?
How the world's oldest clove tree defied an empire
Why Royal Ballet principal Sergei Polunin quit

BBC navigation

BBC © 2013 The BBC is not responsible for the content of external sites. Read more.

This page is best viewed in an up-to-date web browser with style sheets (CSS) enabled. While you will be able to view the content of this page in your current browser, you will not be able to get the full visual experience. Please consider upgrading your browser software or enabling style sheets (CSS) if you are able to do so.

Americas Africa Europe Middle East South Asia Asia Pacific