{"id":7225,"date":"2010-02-21T06:10:26","date_gmt":"2010-02-21T11:10:26","guid":{"rendered":"http:\/\/www.shamusyoung.com\/twentysidedtale\/?p=7225"},"modified":"2010-02-22T09:00:14","modified_gmt":"2010-02-22T14:00:14","slug":"malicious-spam-up-500-in-2009","status":"publish","type":"post","link":"https:\/\/www.shamusyoung.com\/twentysidedtale\/?p=7225","title":{"rendered":"Malicious Spam Up 500% in 2009"},"content":{"rendered":"<p>For the last several years malicious spam has held steady at around 600 million a day, but in 2009 <a href=\"http:\/\/www.escapistmagazine.com\/news\/view\/98359-Spam-Messages-Increased-to-3-Billion-Day-in-2009\">it jumped<\/a> up to 3 &lt;carlsagan&gt; <em>b<\/em>illion &lt;\/carlsagan&gt; a day.  (Malicious compared to simply unwanted.  The &#8220;unwanted&#8221; numbers are much higher.) According to <a href=\"http:\/\/www.m86security.com\/newsimages\/trace\/M86_Labs_Report_Jan2010.pdf\">the report<\/a> [pdf file] the increase was due to the increased proliferation and sophistication of botnets. <\/p>\n<p>It&#8217;s interesting to note that Adobe Acrobat (and the Adobe product line in general) was by far the leading source of vulnerabilities.  Which makes it humorously mysterious as to why the people who put the report together chose to package their findings <em>inside of a pdf file<\/em>. Okay, the report itself is not a source of infection, but the second biggest problem* with Acrobat is that people routinely use it for packaging information that would be more useful in simple HTML.  Let us not further legitimize this practice using a document outlining the <em>dangers<\/em> of this practice. <\/p>\n<p>Anyway. Botnets. Botnets is such a strange term.  It makes it sound like there are these legions of networked robots, like the Geth all nestled into cold metal racks, ticking away the time thinking malevolent computer thoughts about the worthlessness of fleshbags. But the truth is that a botnet is simply a bunch of compromised machines owned by the clueless, the uneducated, the irresponsible, or the idiotic.  When your friend asks you to come over and help fix their computer and you find the thing is overrun with mysterious and malicious processes, you&#8217;re not just looking at a hosed computer.  The machine in front of you is most likely given over to the service of the baleful and dangerous machinery that poisons the network every day.  People frequently gesture vaguely in the direction of Russia or China when speaking of mysterious cyber threats. But the real threat is coming from your buddy&#8217;s PC because he downloaded and ran a program he shouldn&#8217;t.  The emails may have been authored in far-off lands (maybe) but they are being sent from his computer and millions of others like it.<\/p>\n<p>My wife seems to be the go-to woman around here when computers go bad among friends and family. (People used to call me all the time for help with these sorts of problems, since I&#8217;m the &#8220;computer guy&#8221; to them.  But every. single. person. owns a dog or a cat, and I&#8217;m very allergic. Which means I can safely and honestly refuse for health reasons instead of needing to invent some other excuse.) My wife is cursed with a rare form of perseverance and generosity that compels her to take on these sorts of jobs.  She used to simply install AVG anti-virus and have it cleanse the machine, but over the years the threats have grown more sophisticated.  She eventually encountered a machine that wouldn&#8217;t let her install SpyBot or whatever other tools she needed. <em>The malware was purposefully defending itself.<\/em>  This, along with the risk of missing unidentified threats, caused her to adopt a scorched-earth policy:  If you call Heather she <em>will<\/em> fix your computer.  But she will do so by installing the operating system fresh. <em>Oh? You&#8217;re disappointed that you lost all your settings and that cute little screensaver of the bunny you loved so much and now the machine has forgotten all your passwords and bookmarks? Well maybe next time you should think twice before downloading software from www.microsoft.f3gxq9i12p.com\/totallylegit\/trustus.html.<\/em><\/p>\n<p>I kid. Sort of.  It&#8217;s easy to get frustrated with people who fall into these traps, but the truth is that a lot of the knowledge we take for granted took years to acquire. How to spot a bogus URL. Or understand the difference between a link and the text that encapsulates it. Or spot a phishing email based on the lack of proper https. Or how to identify dangerous or potentially dangerous documents. (pdf files.) Or when a site or email is asking for information they should already have. Or how to tell that this popup window didn&#8217;t ACTUALLY scan your computer and find a bunch of viruses. <\/p>\n<p>The truth is that you could spend many, many hours educating someone so that they don&#8217;t fall for these scams that seem to be so insultingly transparent to others.  The problem is daunting.  Most people don&#8217;t want to have to become computer literate in order to use the net.  You don&#8217;t need to be &#8220;TV literate&#8221; or &#8220;phone literate&#8221; or &#8220;DVD player literate&#8221;.  The knowledge you need to use these devices is small and the dangers of ignorance are small or nonexistent. But you can get yourself into a great deal of trouble with the internet, and if you screw up your problems become everyone else&#8217;s problem.  What we&#8217;re seeing is a more perilous version of the &#8220;blinking 12:00&#8221; problem that we saw on all VCRs in the 80&#8217;s. The tech requires more education than 95% of the people are willing to acquire. (This isn&#8217;t just an age thing, either. There are plenty of young people who make these mistakes.) They see the PC as a piece of entertainment equipment (and for them, it largely is) and they just want to push the buttons and have it work.  Historically, this isn&#8217;t an unreasonable thing to expect. Only now instead of having the VCR blink 12:00am to announce their lack of technical knowledge, their computer is conscripted into the service of people who are undeniably evil and destructive. It would be one thing if their computer just stole their credit cards and that was the end of it.  But instead the machine begins sending out emails, posting comments to websites, co-opting the user&#8217;s Twitter and Facebook in order to ensnare their friends, and generally making a great deal of trouble for everyone else.  <\/p>\n<p>It&#8217;s a technical problem, but it seems to need a social solution. <\/p>\n<p><small>* The biggest problem with Acrobat is the security vulnerabilities.  The third is that it&#8217;s just plain <a href=\"?p=564\">awful<\/a> <a href=\"?p=634\">software<\/a>.<\/small><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For the last several years malicious spam has held steady at around 600 million a day, but in 2009 it jumped up to 3 &lt;carlsagan&gt; billion &lt;\/carlsagan&gt; a day. (Malicious compared to simply unwanted. The &#8220;unwanted&#8221; numbers are much higher.) According to the report [pdf file] the increase was due to the increased proliferation and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-7225","post","type-post","status-publish","format-standard","hentry","category-general"],"_links":{"self":[{"href":"https:\/\/www.shamusyoung.com\/twentysidedtale\/index.php?rest_route=\/wp\/v2\/posts\/7225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.shamusyoung.com\/twentysidedtale\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.shamusyoung.com\/twentysidedtale\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.shamusyoung.com\/twentysidedtale\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.shamusyoung.com\/twentysidedtale\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7225"}],"version-history":[{"count":0,"href":"https:\/\/www.shamusyoung.com\/twentysidedtale\/index.php?rest_route=\/wp\/v2\/posts\/7225\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.shamusyoung.com\/twentysidedtale\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.shamusyoung.com\/twentysidedtale\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.shamusyoung.com\/twentysidedtale\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}