Tag Archives: bot

Catch the Bad Bots with Free RUBotted from Trend Micro

Bots, an abbreviation of “robots”, are good. Then again, Bots are bad. So which one of those statements is correct? In fact, both are correct – there are good Bots, and there are bad Bots.

Technology, in most cases, is neutral – it’s how we implement technology that establishes its value, and impacts any ethical questions that surrounds its use.

Good Bots include special software such as search engine spiders used by companies like Google, Yahoo and others to find links and content on the Internet. The Internet would not be, and could not be, the Internet we have come to know, and depend on, without these specialized Bots.

Bad or malicious Bots, in contrast, are designed to infiltrate computer systems with the objective of “herding”, or consolidating, systems into so called “Botnets”, whose primary aim is to create a network of compromised computers such as the infamous Storm Botnet (a P2P network), which according to many experts had the power of a supercomputer.

The power of the Storm Botnet was such, that it was responsible for 20 per cent of all spam email sent in the first quarter of 2008.

Many security experts believe that Botnets are responsible for approximately 75 per cent of all spam currently in circulation. Heavily promoted products on all of these Botnets tend to be male enlargement drugs, replica watches and sexually explicit material.

The strategy employed by the owners of these Botnets is particular ingenious, since there’s a strategic crossover with the products being promoted by all five of these Botnets.

Frighteningly it is accurate to say that these Botnets are getting increasingly larger every day. According to the U.S. Federal Bureau of Investigation, there are at least 1 million Botnetted computers in the U.S.

Worse, some security firms estimate that currently there are as many as 10 million Botnetted machines worldwide. In fact, some researchers believe that this may just be the part of the iceberg we can see above the waterline.

Not surprisingly such large numbers of infected machines have produced some of the most powerful networked computer systems in the world. It seems sensible to predict, that malware and phishing attacks from these Botnets can be expected to increase in frequency.

For your own benefit, it’s obviously important to keep your computer from becoming infected and becoming a part of this problem. Perhaps it’s less obvious that we all share a responsibly to help protect other computer users on the Internet from becoming infected.

The way to do that is to ensure that you are part of the solution; not part of the problem created by running an unsecured machine, (which means installing as many levels of protection as possible), or by engaging in unsafe surfing practices.

To help you keep your computer from being herded into a Botnet, Trend Micro has released a beta of RUBotted, a small program that watches for incoming Bot related traffic, which is worth considering adding to your security toolbox.

Fast facts:

Trend Micro RUBotted (Beta) is a small program that runs on your computer, watching for Bot related activities. RUBotted intelligently monitors your computer’s system behavior for activities that are potentially harmful to both your computer and other people’s computers.

RUBotted monitors for remote command and control (C&C) commands sent from a Bot-herder to control your computer. Additionally, RUBotted watches for an array of potentially malicious Bot-related activities, including mass mailing – a common activity performed by a Bot-infected computer.

RUBotted co-exists with your existing AV software, providing advanced Bot specific behavior monitoring. RUBotted does not rely on frequent, network intensive updates to ensure your computer’s continued protection.

Upon discovering a potential infection, RUBotted prompts you to scan and clean your computer.

Operating System requirements:

Windows 2000 Professional (Latest Service Pack Installed)

Windows XP Professional or Home Edition (Latest Service Pack Installed)

Windows 2003 Server (Latest Service Pack Installed)

Windows Vista (32 Bit with Latest Service Pack Installed)

Note from Trend Micro: RUBotted cannot protect computers running Panda Internet Security 2008.

Download at: Trend Micro

26 Comments

Filed under Anti-Malware Tools, bots, Don't Get Hacked, Free Security Programs, Freeware, Geek Software and Tools, Interconnectivity, Online Safety, Software, Spyware - Adware Protection, System File Protection, System Security, Windows Tips and Tools

Free Botnet Protection – Trend Micro’s RUBotted

It is becoming increasingly clear that at the current rate of growth in malware in circulation and under development, computer operating systems and applications will continue to be compromised at an ever increasing rate.

According to Panda Labs, Panda Security’s laboratory for detecting and analyzing malware, it has received and analyzed an average of more than 3,000 new strains of malware every day, over the course of the last year. In their view, this represents a malware epidemic. It would be difficult to argue with that assessment.

In terms of percentages, according to Panda, the number of new examples of malware appearing in 2007 increased 800% with respect to 2006 which, in turn, witnessed an increase of 172% over the previous year.

With the increase in user participation on MySpace, FaceBook, and other social networking sites, the installation of malware, based on social engineering, seems poised for a major increase in activity.

Essentially then, it’s up to individuals to keep up as best they can; which means installing as many levels of protection as possible.

Trend Micro has released a beta of RUBotted, a small program that watches for incoming bot related traffic which is worth considering adding to your security toolbox.

From TrendSecure

Trend Micro RUBotted (Beta) is a small program that runs on your computer, watching for bot related activities. RUBotted intelligently monitors your computer’s system behavior for activities that are potentially harmful to both your computer and other people’s computers.

RUBotted monitors for remote command and control (C&C) commands sent from a bot-herder to control your computer. Additionally, RUBotted watches for an array of potentially malicious bot-related activities, including mass mailing – a common activity performed by a bot-infected computer.

RUBotted co-exists with your existing AV software, providing advanced bot specific behavior monitoring. RUBotted does not rely on frequent, network intensive updates to ensure your computer’s continued protection.

Operating Systems:

Windows 2000 Professional (Latest Service Pack Installed)

Windows XP Professional or Home Edition (Latest Service Pack Installed)

Windows 2003 Server (Latest Service Pack Installed)

Windows Vista (32 Bit with Latest Service Pack Installed)

Download at: Trend Micro

For another view describing how we got to be in danger from Botnets read TechPaul’s – Modern Nightmare

10 Comments

Filed under Anti-Malware Tools, Beta Software, Free Security Programs, Freeware, Geek Software and Tools, Interconnectivity, Internet Safety Tools, Online Safety, Spyware - Adware Protection, System Security, Windows Tips and Tools

Stop the Bot! – Protect Your Computer Free- Install RUBotted

It is becoming increasingly clear that at the current rate of growth in malware in circulation and under development, computer operating systems and applications will continue to be compromised at an ever increasing rate.

According to Panda Labs, Panda Security’s laboratory for detecting and analyzing malware, it has received and analyzed an average of more than 3,000 new strains of malware every day, over the course of the last year. In their view, this represents a malware epidemic. It would be difficult to argue with that assessment.

In terms of percentages, according to Panda, the number of new examples of malware appearing in 2007 increased 800% with respect to 2006 which, in turn, witnessed an increase of 172% over the previous year.

With the increase in user participation on MySpace, FaceBook, and other social networking sites, the installation of malware, based on social engineering, seems poised for a major increase in activity.

Essentially then, it’s up to individuals to keep up as best they can; which means installing as many levels of protection as possible.

Trend Micro has released a beta of RUBotted, a small program that watches for incoming bot related traffic which is worth considering adding to your security toolbox.

From TrendSecure

Trend Micro RUBotted (Beta) is a small program that runs on your computer, watching for bot related activities. RUBotted intelligently monitors your computer’s system behavior for activities that are potentially harmful to both your computer and other people’s computers.

RUBotted monitors for remote command and control (C&C) commands sent from a bot-herder to control your computer. Additionally, RUBotted watches for an array of potentially malicious bot-related activities, including mass mailing – a common activity performed by a bot-infected computer.

RUBotted co-exists with your existing AV software, providing advanced bot specific behavior monitoring. RUBotted does not rely on frequent, network intensive updates to ensure your computer’s continued protection.

Operating Systems:

· Windows 2000 Professional (Latest Service Pack Installed)

· Windows XP Professional or Home Edition (Latest Service Pack Installed)

· Windows 2003 Server (Latest Service Pack Installed)

· Windows Vista (32 Bit with Latest Service Pack Installed)

Download at: Trend Micro

Share this post :

1 Comment

Filed under Anti-Malware Tools, Beta Software, Freeware, Interconnectivity, Internet Safety, Internet Safety Tools, Online Safety, Phishing, Safe Surfing, Software, System Security, System Utilities, Utilities, Windows Tips and Tools

Storm Botnets – The Computational Power of Super Computers

I must admit that I get very tired of opening my email accounts only to see spam email after spam email, reminding me that enlargement, growth, and natural male enhancement techniques can all be mine if I just click on the enclosed link.

It didn’t take long to establish that the driving force behind the majority of these annoying emails is the well established Storm bot network. Security experts maintain that the Storm bot network continues to be leased to online pharmacy spammers.

The Storm Trojan which first appeared in Europe more than a year ago, takes its name from the content contained in emails relating to extreme bad weather striking parts of Europe at that time.

Those users who were enticed into clicking on links enclosed in the email were directed to a web site that included malevolent code designed to infect Windows PCs with the aim of turning the now infected machine into a spam bot.

The initial success and the continued implementation, in various forms, of this highly sophisticated malware attack has led to the creation of a botnet of unprecedented proportions; a colossal spam-producing network.

According to Bradley Anstis, Vice-President of Products for Marshal, a leader in integrated email and Internet content security solutions, the Storm botnet was responsible for 20 per cent of all spam email sent in the first quarter of 2008.

Marshall is currently monitoring five botnets, including the Storm botnet, believed to be responsible for approximately 75 per cent of all spam currently in circulation. Heavily promoted products on all of these botnets tend to be male enlargement drugs, replica watches and sexually explicit material. The strategy employed by the owners of these botnets is particular ingenious since there’s a strategic crossover with the products being promoted by all five of these botnets.

Frighteningly it is accurate to say that these botnets are getting increasingly larger every day. According to the U.S. Federal Bureau of Investigation, there are at least 1 million botnetted computers in the U.S. Worst, some security firms estimate that currently there are as many as 10 million botnetted machines worldwide. In fact, some researchers believe that this may just be the part of the iceberg we can see above the waterline.

Not surprisingly such large numbers of infected machines have produced some of the most powerful networked computer systems in the world. As a result, many industry analysts are convinced malware and phishing attacks from these botnets can be expected to increase in frequency.

A more frightening possibility involves the potential power of these botnets being turned against secure computer systems in the government, commercial, and industrial sectors in brute-force attacks. Some have argued a coordinated attack, such as the one we witnessed last year against Estonia’s infrastructure, is inevitable.

For your own benefit it’s obviously important to keep your computer from becoming infected and becoming a part of this problem. Perhaps it’s less obvious that we all share a responsibly to help protect other computer users on the Internet from becoming infected. The way to do that is to ensure that you are part of the solution; not part of the problem created by running an insecure machine, or by engaging in unsafe surfing practices.

As I have pointed out in the past on this Blog, the following are actions you can take to protect your computer system:

· When surfing the web: Stop. Think. Click
· Don’t open unknown email attachments
· Don’t run programs of unknown origin
· Disable hidden filename extensions
· Keep all applications (including your operating system) patched
· Turn off your computer or disconnect from the network when not in use
· Disable Java, JavaScript, and ActiveX if possible
· Disable scripting features in email programs
· Make regular backups of critical data
· Make a boot disk in case your computer is damaged or compromised
· Turn off file and printer sharing on the computer.
· Install a personal firewall on the computer.
· Install anti-virus/anti-spyware software and ensure it is configured to automatically update when you are connected to the Internet
· Ensure the anti-virus software scans all e-mail attachments
· Install McAfee Site Advisor, WOT (my recommendation), or a similar browser add-on

Share this post :

3 Comments

Filed under Interconnectivity, Internet Safety, Malware Advisories, Online Safety, rootkits, Safe Surfing, Spyware - Adware Protection, Windows Tips and Tools