Each day, millions of machines around the world innocently send billions of spam emails and launch distributed denial-of-service attacks against other victims -- and most owners of these infected machines are unaware that their desktop computer or laptop is under the control of cybercriminals. But security experts worry that increasingly, users who do have a clue that their machine is infected with some sort of malware either just arent motivated to do something about it or dont know what to do. (See New Massive Botnet Twice the Size of Storm and SecureWorks Unveils Research on Spamming Botnets.)
Many consumers dont make the connection between their slowed-down laptop or extra bandwidth usage and how this could be a result of their machine helping execute a cyber attack against another user, company, or even another country. The savvier users out there are aware of the problem, says Ashar Aziz, CEO of botnet security firm FireEye. But from the perspective [of most users], if performance affects them... thats what they care about.
Some consider a potential infection no big deal as long as their computer is working and getting them onto the Web. And many incorrectly assume that they dont have any valuable data a hacker would want, anyway. The majority of [consumers] are unaware that security plays a role in preventing online crime, says Lucia Mikasa, senior director of marketing at Narus. Were so exposed to it that we assume everyone knew that.
This misguided apathy could be a combination of factors, according to botnet experts. Consumers still dont have the techno-savvy to grasp just what a botnet can do nor how to detect that their machine is a new recruit, and they just dont consider bot-jacking being akin to their car getting stolen and used in a bank heist.
Botnet is still not a mainstream term, which is a big part of the problem. A recent survey conducted by the National Cybersecurity Alliance found that 71 percent of users have never heard of a botnet, while about 29 percent are aware of botnets. While 53 percent said they believed it was possible for a hacker to use their computer to launch an attack on a person, a business, and on our country, 59 percent said its not at all likely that the security of their computer could affect homeland security. Over 20 percent said it was somewhat likely.
Theres plenty of uncertainty among users, too: Forty-six percent of consumers in the NCA survey said they are not at all sure what to do if they became a victim of cybercrime, and nearly 50 percent said they dont know how to protect themselves from the bad guys. (NCA surveyed nearly 2,250 online consumers between the ages of 18 and 65 for the survey.)
The industry needs to do a better job of teaching consumers about the connection between botnets, spam, cybercrime -- and their personal machines, say experts, like Amy Barzdukas, senior director of Microsofts Windows Live OneCare service. Your machine could be used as a staging ground for a raid on other machines, says Barzdukas. We need to do a much better job of educating users about the fact that they can indirectly be part of the cybercrime equation.
Then there are those users who regularly scan for viruses and patch their machines, but still get infected as bots. They often assume that scanning and patching keep them immune from bot infections, but not so, many botnet experts say: Botnets are becoming stealthier in order to avoid detection and stay alive, so their malware is also getting harder and harder to detect, too. The old adage that a slowed-down machine is the first sign of bot infection doesnt always apply: Some bot malware is more low-profile now and doesnt eat up the resources that it used to.
The value of a botnet is its threat and longevity. The game here now is how can you leverage resources on that [bot] machine and tap into it for as long as possible without raising a flag, says Doug Camplejohn, founder and CEO of Mi5 Networks.
It may take a more in-your-face approach to educate users on what bot infections really do, many botnet experts say. As in, your laptop could be spamming Grandmas desktop, or is actively trying to get you more spam.
Until you can put this in real terms consumers can really understand, it wont hit home, says Randy Abrams, director of technical education for Eset. They can use someones machine to host child porn, for example. And law enforcement may not be savvy enough to know that you didnt download that porn yourself, leading to unfair prosecution.
But dont completely blame the bot-infected user: Their ISPs and security vendors also need to up the ante in the botnet war, experts say. ISPs really need to step up and be able to provide some type of early warning... that a botnet is building up, for example, says Supranamaya Ranjan, aka Dr. Soups, a senior member of the technical staff at Narus.
And meanwhile, while the European Union and Japan are creating legislation for ISPs and governments to help eliminate bots, the U.S. hasnt been as aggressive with its ISPs, notes FireEyes Aziz.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.
Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio