April 1, 2009

April 1, 2009
Malicious Cyber-Crooks Attack Hundreds of
Personal Computers Each Minute

Welcome to another day in my life. I am actually writing this late on March 31st because my computer may not be working by the time you read it.

I started getting strange things on my computer about 72 hours ago and heard today about a new virus which is supposed to steal your information and kill your hard drive. So if you do not see a new entry for a few days, you will know the current computer died and I am having to try and get a new one up and running.

Here is some more information on the virus.

One false click and a stranger can take over your computer.

Experts estimate 10 to 15 percent of personal computers in the U.S. have been taken over and harnessed together into powerful illegal computing tools called "botnets." Some experts believe these botnets are so massive that the criminal hackers who run them have more computing power than the U.S. government.

"It's a very dangerous tool," said Chris O'Ferrell, a computer security consultant and an "ethical hacker."

O'Ferrell and two other computer security experts showed ABC News how criminals can easily gain access to your computer. You open an unknown e-mail attachment, which infects your computer with a virus. The virus hijacks your computer, harnesses its processing power for its own purposes, and then links your computer with hundreds of others to essentially create a supercomputer -- the botnet.

With a click, hackers can see everything you do online -- including your passwords and bank balances. Theoretically, they can even watch movements you make around your own home, if your computer has a Webcam attached to it. Most owners never know their computer is under someone else's control.

"This is organized crime at a global level that is in control of these botnets," O'Ferrell said. "It is a very profitable and very powerful tool, and they are going to use it as much as they can until somebody stops them."

Criminals use botnets to send out 80 percent of the world's spam, to steal people's financial identities and to crack codes that allow them to make massive data breaches. Criminals also use botnets to send overhwhelming amounts of data to companies' Web sites.

The data overload causes the companies' servers to crash. And then the crooks demand a ransom before allowing the Web site to get back online again. This is called a "denial of service" attack and was even used as a form of warfare during Russia's conflict with Georgia.

"It is a serious threat because the cyber criminals recognize that by harnessing the power of tens of thousands or hundreds of thousands of computers, they have that many more opportunities to get to you," said Shawn Henry, chief of the FBI Cyber crime division.


Botnet: a collection of computers that hackers have taken over and harnessed together into an illegal supercomputer used to commit crimes.

Bot: Short for "robot." A single computer in a botnet.

Zombie: Another name for a single computer whose "brain" is now being used by outsiders somewhere.

Bot Herder: a criminal hacker, often based in Eastern Europe, who has amassed a collection of computers that do his bidding.

Hopefully you will see an entry after the one for tomorrow which is about how you can protect your computer.

Wishing you health, hope and happiness.

Big bear hug,

Daddy Dab