Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


07:40 AM
Connect Directly

When Bots Don't Care - Or Don't Know Enough to

Misguided apathy among consumers could be contributing to botnet proliferation

Each day, millions of machines around the world innocently send billions of spam emails and launch distributed denial-of-service attacks against other victims -- and most owners of these infected machines are unaware that their desktop computer or laptop is under the control of cybercriminals. But security experts worry that increasingly, users who do have a clue that their machine is infected with some sort of malware either just aren’t motivated to do something about it or don’t know what to do. (See New Massive Botnet Twice the Size of Storm and SecureWorks Unveils Research on Spamming Botnets.)

Many consumers don’t make the connection between their slowed-down laptop or extra bandwidth usage and how this could be a result of their machine helping execute a cyber attack against another user, company, or even another country. “The savvier users out there are aware of the problem,” says Ashar Aziz, CEO of botnet security firm FireEye. “But from the perspective [of most users], if performance affects them... that’s what they care about.”

Some consider a potential infection no big deal as long as their computer is working and getting them onto the Web. And many incorrectly assume that they don’t have any valuable data a hacker would want, anyway. “The majority of [consumers] are unaware that security plays a role in preventing online crime,” says Lucia Mikasa, senior director of marketing at Narus. “We’re so exposed to it that we assume everyone knew that.”

This misguided apathy could be a combination of factors, according to botnet experts. Consumers still don’t have the techno-savvy to grasp just what a botnet can do nor how to detect that their machine is a new recruit, and they just don’t consider bot-jacking being akin to their car getting stolen and used in a bank heist.

Botnet is still not a mainstream term, which is a big part of the problem. A recent survey conducted by the National Cybersecurity Alliance found that 71 percent of users have never heard of a botnet, while about 29 percent are “aware” of botnets. While 53 percent said they believed it was possible for a hacker to use their computer to launch an attack on a person, a business, and on our country, 59 percent said it’s not at all likely that the security of their computer could affect homeland security. Over 20 percent said it was “somewhat likely.”

There’s plenty of uncertainty among users, too: Forty-six percent of consumers in the NCA survey said they are “not at all” sure what to do if they became a victim of cybercrime, and nearly 50 percent said they don’t know how to protect themselves from the bad guys. (NCA surveyed nearly 2,250 online consumers between the ages of 18 and 65 for the survey.)

The industry needs to do a better job of teaching consumers about the connection between botnets, spam, cybercrime -- and their personal machines, say experts, like Amy Barzdukas, senior director of Microsoft’s Windows Live OneCare service. “Your machine could be used as a staging ground for a raid” on other machines, says Barzdukas. “We need to do a much better job of educating users” about the fact that they can indirectly be part of the cybercrime equation.

Then there are those users who regularly scan for viruses and patch their machines, but still get infected as bots. They often assume that scanning and patching keep them immune from bot infections, but not so, many botnet experts say: Botnets are becoming stealthier in order to avoid detection and stay alive, so their malware is also getting harder and harder to detect, too. The old adage that a slowed-down machine is the first sign of bot infection doesn’t always apply: Some bot malware is more low-profile now and doesn’t eat up the resources that it used to.

“The value of a botnet is its threat and longevity. The game here now is how can you leverage resources on that [bot] machine and tap into it for as long as possible without raising a flag,” says Doug Camplejohn, founder and CEO of Mi5 Networks.

It may take a more in-your-face approach to educate users on what bot infections really do, many botnet experts say. As in, your laptop could be spamming Grandma’s desktop, or is actively trying to get you more spam.

“Until you can put this in real terms” consumers can really understand, it won’t hit home, says Randy Abrams, director of technical education for Eset. “They can use someone’s machine to host child porn, for example. And law enforcement may not be savvy enough to know that you didn’t download that porn yourself,” leading to unfair prosecution.

But don’t completely blame the bot-infected user: Their ISPs and security vendors also need to up the ante in the botnet war, experts say. “ISPs really need to step up and be able to provide some type of early warning... that a botnet is building up,” for example, says Supranamaya Ranjan, aka Dr. Soups, a senior member of the technical staff at Narus.

And meanwhile, while the European Union and Japan are creating legislation for ISPs and governments to help eliminate bots, the U.S. hasn’t been as aggressive with its ISPs, notes FireEye’s Aziz.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • FireEye Inc.
  • Narus Inc.
  • Microsoft Corp. (Nasdaq: MSFT)
  • ESET
  • Mi5 Networks Inc.

    Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    FluBot Malware's Rapid Spread May Soon Hit US Phones
    Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
    7 Modern-Day Cybersecurity Realities
    Steve Zurier, Contributing Writer,  4/30/2021
    How to Secure Employees' Home Wi-Fi Networks
    Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    How Enterprises are Developing Secure Applications
    How Enterprises are Developing Secure Applications
    Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2021-05-06
    The "gitDiff" function in Wayfair git-parse <=1.0.4 has a command injection vulnerability. Clients of the git-parse library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.
    PUBLISHED: 2021-05-06
    Exim 4 before 4.94.2 has Execution with Unnecessary Privileges. By leveraging a delete_pid_file race condition, a local user can delete arbitrary files as root. This involves the -oP and -oPX options.
    PUBLISHED: 2021-05-06
    Jellyfin is a free software media system that provides media from a dedicated server to end-user devices via multiple apps. Verions prior to 10.7.3 vulnerable to unauthenticated Server-Side Request Forgery (SSRF) attacks via the imageUrl parameter. This issue potentially exposes both internal and ex...
    PUBLISHED: 2021-05-06
    Mixme is a library for recursive merging of Javascript objects. In Node.js mixme v0.5.0, an attacker can add or alter properties of an object via 'proto' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the ava...
    PUBLISHED: 2021-05-06
    Improper input validation of octal strings in Python stdlib ipaddress 3.10 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many programs that rely on Python stdlib ipaddress. IP address octects are left stripped instead of evaluated as valid I...