Wired mag article on spammers playing traceroute games with trojaned boxes
Lou Katz
lou at metron.com
Fri Oct 10 01:47:20 UTC 2003
On Thu, Oct 09, 2003 at 05:20:10PM -0700, Margie Arbon wrote:
>
> --On Thursday, October 09, 2003 7:54 PM -0400 Susan Harris
> <srh at merit.edu> wrote:
>
> >
> >Folks, let's move this discussion onto one of the many lists that
> >focuses on spam:
> >
> > http://www.claws-and-paws.com/spam-l/spam-l.html -- spam-l list
> >for spam prevention and discussion
> > http://www.abuse.net/spamtools.html -- spam tools list for
> >software tools that detect spam
> > net.admin.net-abuse.email | net.admin.net-abuse.usenet -- usenet
> >lists
> >
>
> I am curious as to why open proxies, compromised hosts, trojans and
> routing games are not considered operational issues simply because
> the vehicle being discussed is spam.
>
> With all due respect, we have a *problem*. End user machines on
> broadband connections are being misconfigured and/or compromised in
> frightening numbers. These machines are being used for everything
> from IRC flooder to spam engines, to DNS servers to massive DDoS
> infrastructure. If the ability of a teenager to launch a gb/s DDoS,
> or of someone DoSing mailservers off the internet with a trojan that
> contains a spam engine is not operational, perhaps it's just me
> that's confused.
I think that in the case of spam, it is not some teenager, but rather
adult, vicious, sociopathic criminals. They are not fooling around, folks.
--
-=[L]=-
More information about the NANOG
mailing list