Group of ISPs issue tips for dealing with bots

Share this article:
A group made up of some of the largest global internet service providers has created a set of best practices for dealing with bot infections.

The document from the Messaging Anti-Abuse Working Group (MAAWG) is aimed at helping network operators detect bots, notify customers they are infected and limit the infection. MAWWG includes companies such as Verizon, AT&T, Comcast and Time Warner Cable.

Bots, or networks of infected computers, send spam or run denial-of-service attacks (DoS). Though 80 percent of consumers are aware of the risks that bots pose, only 20 percent believe they have ever been infected, according to a survey from MAAWG released in July.

“Bots now are really designed now to fly under the radar," Michael O'Reirdan, MAAWG chairman told SCMagazineUS.com on Friday. "They are written so they are not using a lot of computer resources.”

O'Reirdan said there are signs that a machine may be infected with a bot. For example, speed may be degraded or emails the owner never sent may be bounced back.

To detect bots, the paper recommends utilizing one of the many free online scanning tools that are available from security vendors such as Kaspersky or McAfee.

Once it is determined that a user is part of a botnet, users must take immediate steps, the document states. All important data on the computer should be backed up and all operating system and anti-virus patches should be updated. To remove the infection, various free online tools are recommended in the document, such as Microsoft's Malicious Software Removal Tool.

The paper also addresses concerns over privacy -- an issue that must be taken into consideration when ISPs monitor their pipes for infection.

"The detection of malware can often be a more intense process that exposes user data to greater scrutiny and, as such, there is a duty to ensure that user information is adequately protected," the document says.

Share this article:
You must be a registered member of SC Magazine to post a comment.
close

Next Article in News

Sign up to our newsletters

TOP COMMENTS

More in News

ISSA tackles workforce gap with career lifecycle program

ISSA tackles workforce gap with career lifecycle program ...

On Thursday, the group launched its Cybersecurity Career Lifecycle (CSCL) program.

Amplification DDoS attacks most popular, according to Symantec

Amplification DDoS attacks most popular, according to Symantec

The company noted in a whitepaper released on Tuesday that Domain Name Server amplification attacks have increased 183 percent between January and August.

Court shutters NY co. selling security software with "no value"

A federal court shut down Pairsys at the request of the Federal Trade Commission.