ietf-asrg
[Top] [All Lists]

RE: [Asrg] SICS

2005-01-03 00:26:54


You've got it, for the most part. They also consider how well
connected the machines are i.e. faster link, more spam. They
also know who's watching and read ASRG and others.

-M<

--
Martin Hannigan                         (c) 617-388-2663
VeriSign, Inc.                          (w) 703-948-7018
Network Engineer IV                       Operations & Infrastructure
hannigan(_at_)verisign(_dot_)com



-----Original Message-----
From: asrg-bounces(_at_)ietf(_dot_)org 
[mailto:asrg-bounces(_at_)ietf(_dot_)org]On Behalf Of
Seth Breidbart
Sent: Monday, January 03, 2005 12:03 AM
To: asrg(_at_)ietf(_dot_)org
Subject: Re: [Asrg] SICS


"Hannigan, Martin" <hannigan(_at_)verisign(_dot_)com> top-posted:

Did you mean small percentage of vulns "on the list" or vulnerable
machines?

If even a small percentage of machines are vulnerable, multiply by a
lot of machines and they get a lot of infected machines.

They can't easily control the inection rate, but they can control
the utilization rate. One thing they want is non rbl listed
zombies. This is a good tactic re infect many, list them, then
silence until needed.

Or set the rent for a non-listed machine higher, and try each victim
 from a listed machine, if that doesn't get through, then use a
non-listed machine.

Seth

_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg


_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg


<Prev in Thread] Current Thread [Next in Thread>