You've got it, for the most part. They also consider how well
connected the machines are i.e. faster link, more spam. They
also know who's watching and read ASRG and others.
-M<
--
Martin Hannigan (c) 617-388-2663
VeriSign, Inc. (w) 703-948-7018
Network Engineer IV Operations & Infrastructure
hannigan(_at_)verisign(_dot_)com
-----Original Message-----
From: asrg-bounces(_at_)ietf(_dot_)org
[mailto:asrg-bounces(_at_)ietf(_dot_)org]On Behalf Of
Seth Breidbart
Sent: Monday, January 03, 2005 12:03 AM
To: asrg(_at_)ietf(_dot_)org
Subject: Re: [Asrg] SICS
"Hannigan, Martin" <hannigan(_at_)verisign(_dot_)com> top-posted:
Did you mean small percentage of vulns "on the list" or vulnerable
machines?
If even a small percentage of machines are vulnerable, multiply by a
lot of machines and they get a lot of infected machines.
They can't easily control the inection rate, but they can control
the utilization rate. One thing they want is non rbl listed
zombies. This is a good tactic re infect many, list them, then
silence until needed.
Or set the rent for a non-listed machine higher, and try each victim
from a listed machine, if that doesn't get through, then use a
non-listed machine.
Seth
_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg
_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg