Bonum Certa Men Certa

Botnets and Bounties Versus Real Security

THERE ARE many reports this week about Windows security problems, but one that really stood out is this one from yesterday:

Microsoft is offering a $250,000 reward for information that leads to the arrest and conviction of the virus writers behind the infamous Conficker (Downadup) worm.


This was also covered in:



So Microsoft plays sheriff and puts money on people's heads rather than actually produce secure and robust systems. That's the equivalent of jailing many people for possession of illegal drugs rather than looking for ways to prevent the trafficking of such drugs. It completely ignores the causes and instead addresses an outcome. The outcome is not just tens of millions of hijacked computers in this case; the 'outcome' is also teenage cyber-criminal who are empowered by badly engineered systems. Will there be a bounty presented to combat each and every Windows virus that exists (there are over a million, including variants)?

In other news, 8 "critical" vulnerabilities have just surfaced in Microsoft software.

Microsoft Patches 8 Critical Vulnerabilities



Microsoft Tuesday patched eight vulnerabilities -- three of them marked "critical" -- in the company's Internet Explorer (IE), Office, Exchange and SQL Server software.


"Critical" is the highest degree of severity in Microsoft's scale, so it's only reasonable to expect larger botnets. Speaking of which, Microsoft is again addressing the wrong problem in the wrong way when it tries to take apart botnets rather consider the reasons for their creation in the first place.

Microsoft has beefed up the Malicious Software Removal Tool (MSRT) that ships with its Windows operating system so that it will detect and root out the notorious Srizbi botnet code.

"This month's MSRT takes on one of the largest botnets currently active worldwide," wrote Microsoft spokesman Vincent Tiu in a blog posting Tuesday, the day the update to the software removal tool was released. "Win32/Srizbi has been accused of being responsible for a huge chunk of spam e-mail messages sent in the years after its discovery," he added. "We hope to make a positive impact with the addition of Win32/Srizbi into MSRT."


This is also covered here.

In other security-related news:

i. Fake Infection Warnings Can Be Real Trouble

Michael Vana knew something was up when he saw the pop-up from "Antivirus 2009" in the middle of his screen. The former Northwest Airlines avionics technician guessed that the dire warning of a system infection was fake, but when he clicked on the X to close the window, it expanded to fill his screen. To get rid of it, he had to shut down his PC.


ii. Fraudsters cream opposition in cybercrime wars

The celebration of Safer Internet Day on Tuesday was marked by warnings that cybercriminals are staying ahead of defenders in their attempts to defraud or otherwise abuse internet users.


iii. Germany deploys cybersoldiers

GERMANY HAS REVEALED that it has a team of 76 soldiers who are trained to defend the country from cyber attacks and software piracy.


Once again, Windows and the Web are unable to play nice with each other:

New Windows virus attacks PHP, HTML, and ASP scripts



Researchers have identified a new strain of malware that can spread rapidly from machine to machine using a variety of infection techniques, including the poisoning of webservers, which then go on to contaminate visitors.

The malware is a variation of a rapidly mutating virus alternately known as Virut and Virux. It has long proved adept at injecting itself into executable files, which are then able to attack uninfected machines through network drives and USB sticks.


A reader has just alerted us that a man is moving from the Ministry of Finance to Microsoft, hinting at possible government connections. Microsoft has already 'pulled an EDGI/MOU' around there.

Regarding news coverage like this one, wrote the reader, "the non-cached page has some nasty tricks to wipe out non-Javascripted browsers." Further he added: "I have often wondered if the sudden push to web 2.0 is to compensate for loss of access that various interests have as people depart Microsoft Windows. The reasons for snubbing client-side javascript are still valid, perhaps more so than years past. Certainly there has been no value added. What does get added, aside from slowness and loss of functionality, is a whole slew of ways to remotely access content or activities on the client."

Those who want a secure system ought to look at GNU/Linux.

Comments

Recent Techrights' Posts

Writing and Coding Isn't Always Enough
Last year we had to assume a role we didn't have before: litigants
Autumn Has Come
Autumn should be exciting in all sorts of ways; it'll also mark our anniversary
 
Why We Stopped Publishing Videos (for Now)
We'll probably get back to videos one day, but it's hard to say when or to what extent
What Animal Rights Activism Teaches Us About Sympathy and Focus
It's possible to believe that the planet is warming, that we must do something about it, and still eat eggs and butter
When You Turn Web Sites About Tech Into Political Sites
A lot of people fall into the trap of catering only for particular groups
Gemini Links 02/09/2025: ROOPHLOCH 2025 and Lagrange 1.19 Released
Links for the day
Gemini Links 01/09/2025: News Corp. WSJ and A Month With NixOS
Links for the day
Slopfarms Already Peaked, They Will Die When Slop Companies Run Out of Money to Borrow
slopfarms will lack an actual "engine"
“Sideloading” Never Killed Anybody
There are many online discussions this week about the misnomer "sideloading"
Slopwatch: Google News as FUD Vector Against Linux and Plagiarism Enhancer, Serial Slopper (SS) Uses LLMs to Googlebomb "Linux"
Slop destroys the Web not just by screwing with search engines and helping plagiarists. It's also responsible for de facto DDoS attacks...
Links 01/09/2025: "Attacks on Science" and China's "Soft Power" Grows
Links for the day
Links 01/09/2025: Fresh Backlash Against Slop and "Norway’s Electricity Crisis is About to Hit Britain"
Links for the day
Links 01/09/2025: Catching Up (Mostly via Deutsche Welle), "Windows TCO" Effect in UK
Links for the day
Gemini Links 01/09/2025: Linguistic Barriers and "Web 1.0 Hosting"
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Sunday, August 31, 2025
IRC logs for Sunday, August 31, 2025
The UEFI 9/11 - Part IV - External Interference
They all seem to be playing a role in crushing Software Freedom and self-determination for users
Links 31/08/2025: Baggage Claim Scams, an Insurrectionist’s War on Culture, and a Sudden Robotics Hype
Links for the day
Gemini Links 31/08/2025: Reviewing Netsurf and Slightly Less Historic Ada Design
Links for the day
IBM Has Taken Control of GNOME
Don't expect a successor to be found any time soon
Links 31/08/2025: Google Gmail Data Breach and LF Puff Pieces for Pay
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, August 30, 2025
IRC logs for Saturday, August 30, 2025
This is What Google News Has Become
Moments ago