Datamation Logo

Report: Businesses Vulnerable to Botnets

August 5, 2009
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

Ten to 25 percent of broadband networks are likely infected by bots, and bots cause 90 percent of spam, according to the Messaging Anti-Abuse Working Group (MAAWG), a coalition of security companies, bandwidth providers, and other interested parties.

MAAWG has issued a report on the problem as well as advice for IT managers, titled “Messaging Anti-Abuse Working Group Common Best Practices for Mitigating Large Scale Bot Infections in Residential Networks” (available here in .PDF format). It details best practices for ISPs for dealing with the issue and provides a list of software for handling bot infections.

“ISPs have expressed concern about the problem,” Michael O’Reirdan, MAAWG chairman, told InternetNews.com. “After all, the bot economy is about ripping people off. Enterprise IT should be as worried about the problem as anyone else. Enterprises have PCs that wander around the planet, aren’t always patch, and travel between home and work.”

There is a lot of evidence that there are bots on corporate networks, he added. “Corporate networks are especially valuable to criminals because they host valuable treasury or bank transactions.”

Bot police best practices

The recommendations on the MAAWG report will be familiar to IT managers and includes the Microsoft Windows Malicious Software Removal Tool, several online anti-virus scanners, and various applications that specialize in finding rootkits, spyware, adware, and bots.

Large enterprises are likely to know what to do about the issue, but smaller IT operations might benefit from the report, which is written for ISPs of all sizes, O’Reirdan said.

“This is not a guarantee,” said O’Reirdan. “There is no magic incantation that will work against all bots.”

He said that every IT manager should focus on the basics, such as patching, and should reinstall the operating system and patches from behind the firewall in the event of an infection. “IT managers should know this already,” he added.

“But please don’t think you’re immune because you have a firewall,”
O’Reirdan said. He pointed to an attack in February in Fargo, N. D., in which a bad URL was distributed through flyers masquerading as parking tickets. A SANS
advisory
warned that the URL on the flyers led to an attack on the user’s browser through an infectious image and then to the download of scareware.

“Attacks can be low-tech and subtle,” O’Reirdan warned.

Article courtesy of InternetNews.com.

  SEE ALL
ARTICLES
 

Subscribe to Data Insider

Learn the latest news and best practices about data science, big data analytics, artificial intelligence, data security, and more.

Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Advertisers

Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.

Advertise with Us

Our Brands


Privacy Policy Terms & Conditions About Contact Advertise California - Do Not Sell My Information

Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.