On the other hand, Information Risk Management questioned how any one
person could "own" hundreds of computers at any one time.
And systems are
often not "owned" by a single group, but exploited by multiple groups
Read 'Honeypots' by Spitzer which describes the honeynet project. It
is not unusual for a hacker to own hundreds of computers. There are
some hacker groups that require members to own thousands of machines as
a condition for entry.
The attack tools are automated. An owned machine can be used as a platform
to launch new attacks.
Some of the hard core criminal spam scams originate from clusters of
hacked machines. This is how some identity theft spams are sent.
The two currencies of the hacking world are stolen credit card numbers
and owned machines. Both are considered fungible commodities.
Phill
_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg