Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

9/29/2009
05:54 AM
Gadi Evron
Gadi Evron
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Dutch ISPs Sign Anti-Botnet Treaty

Netherlands ISPs last month launched a joint effort to fight malware-infected computers and botnets -- fondly described by locals as a "treaty."

Netherlands ISPs last month launched a joint effort to fight malware-infected computers and botnets -- fondly described by locals as a "treaty."The effort involves 14 ISPs and 98 percent of the consumer market, and will include:

  • Exchange of relevant information among the cooperating ISPs
  • Quarantine of infected computers
  • Notification of end users by their ISPs

This way, information sharing will lead to better coverage of the issues and a faster response time, quarantine will ensure that infected computers no longer participate in criminal activity or infect others, and, most importantly, the ISPs will take responsibility to notify their victimized users so they can take action.

This will probably cause some ISPs to lose money. But given that ISPs are a competitive group, I doubt they entered this treaty without reason. Abuse-handling has always been a losing business for ISPs. Just imagine having to pay abuse personnel so they disconnect your clients, and you lose more money.

So what changed for Dutch ISPs?

In recent years, bot-infected computers have been a growing problem for end-user ISPs, as more and more resources are being wasted and not paid for. And the growing global threat of DDoS attacks and other security concerns have shown ISPs that to get help in case of DDoS attack, they need to be a more friendly and reputable service themselves.

The risk of bot-infected computers is also relevant to the country in question because the more computers that are easily available for compromise from outside the country, the more vulnerable the country is to an attack from within, as seen during the 2007 Estonian attacks ("The First Internet War").

Losing customers won't be a major risk with the treaty because other ISPs will be using the same quarantine measures for infected computers.

Then again, maybe the local ISPs have just shown they are socially aware and took responsibility for their part in the safety of the Internet and their users, possibly even paying a certain price out of their bottom line for it.

"It is important that ISPs collectively battle this problem and protect their customers as well as prevent nuisance to the rest of the internet. A safe Internet is pivotal but not natural," says Albert Vergeer, director of Internet for KPN, XS4ALL, and Telfort.

Historically, either a financial incentive or regulatory intervention (such as in Finland) was required to get this type of cooperation. What makes this Dutch ISP treaty special is the willing cooperation without such measures.

But information sharing and cooperation amongs ISPs isn't exactly new. I have had the honor of being one of the people to facilitate such efforts in the past decade.

A written agreement like this in the Netherlands is a huge leap forward in the fight against cybercrime because it's a signed agreement rather than just a goodwill-based effort, and it's among financial entities rather than technical and operational people trying to help each other in their free time to combat the most recent common threat. Time will tell how effective it will be.

Meanwhile, last month the Internet Industry Association (IIA) in Australia recommended that ISPs take a similar stance by accepting a voluntary code of conduct to perform much the same tasks as the Netherlands treaty does. We wish them luck. Perhaps the industry has now matured enough to take such steps.

Chris Fonteijn, chairman of OPTA, had this to say: "Consumers are not even aware of their computer being a host to a bot network, let alone that they know how to undo it. That is why I am pleased to learn that ISPs will help consumers with cleaning up their computers so we can all work together on a safer Internet."

OPTA is not a party to this covenant, but was an instigator of the project and participated actively in the talks and negotiations. As such, OPTA will present on the subject at the upcoming LAP/CNSA workshop in Lisbon.

Thpugh this new treaty is the right way to go, we cannot put all of the responsibility for securing the Internet on the ISPs. It isn't fair, and it isn't right. Many ISPs will not want to follow the Dutch example, but that the Dutch took this step forward is a very promising sign.

Regardless, I foresee a growth market for PC technicians and antivirus software in the Netherlands, as users become aware of the problem and still want to connect to the Internet. And it may also boost sales for new PCs there, as users look to upgrade to more secure systems rather than constantly fixing their older, more vulnerable ones.

Follow Gadi Evron on Twitter: http://twitter.com/gadievron

Gadi Evron is an independent security strategist based in Israel. Special to Dark Reading. Gadi is CEO and founder of Cymmetria, a cyber deception startup and chairman of the Israeli CERT. Previously, he was vice president of cybersecurity strategy for Kaspersky Lab and led PwC's Cyber Security Center of Excellence, located in Israel. He is widely recognized for ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11494
PUBLISHED: 2020-04-02
An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel through 5.6.2. It allows attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL, aka CID-b9258a2cece4.
CVE-2020-7619
PUBLISHED: 2020-04-02
get-git-data through 1.3.1 is vulnerable to Command Injection. It is possible to inject arbitrary commands as part of the arguments provided to get-git-data.
CVE-2020-7620
PUBLISHED: 2020-04-02
pomelo-monitor through 0.3.7 is vulnerable to Command Injection.It allows injection of arbitrary commands as part of 'pomelo-monitor' params.
CVE-2020-7621
PUBLISHED: 2020-04-02
strong-nginx-controller through 1.0.2 is vulnerable to Command Injection. It allows execution of arbitrary command as part of the '_nginxCmd()' function.
CVE-2020-7623
PUBLISHED: 2020-04-02
jscover through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary command via the source argument.