• United States



by Senior Editor

3 Basic Steps to Avoid Joining a Botnet

Nov 19, 20095 mins
CybercrimeIT Leadership

It's getting more difficult to keep employees stay safe and free from malicious activity online. But Team Cymru's Steve Santorelli presents a combination of techniques that can make their chances of infection much lower.

Banging the drum for security awareness never gets old. As much as CSOs try to get folks to bone up on safe practices (both online and in the office), there are always going to be some who need reminding.

Online, the biggest battle these days is against botnets: networks of infected computers which hackers can use — unbeknownst to the machine’s owner — for online crimes including sending out spam or launching a denial of service attack.

Unfortunately, the black-hat techniques employed to snare users into a botnet web have evolved to a level that makes them often undetectable by even the most sophisticated security products. Combine that with a lack of user knowledge, and the threat of infection becomes very high. (See: Botnets: Why it’s Getting Harder to Find and Fight Them).

“The frustrating thing is they can make their chances of getting infected much, much smaller,” said Steve Santorelli, who sees how users fall prey to easily avoidable traps every day. Santorelli, director of global outreach with the non-profit security investigations firm Team Cymru, spends his days monitoring malicious online activity, particularly botnets.

Santorelli notes that while just one strategy probably won’t cover you, with several tools in the tool box, the rate of infection within an organization significantly drops.

Tip 1: Have work AND home machines regularly updated with patches and antivirus software

The average user doesn’t necessarily have a lot of technological knowledge, said Santorelli. They might not realize the importance of working with IT to ensure they are up to date with patching and software upgrades. This problem may be especially prevalent among workers who are exclusively remote.

In fact, a study conducted by security firm Sophos last year found most computer users ignore security updates and turn off their firewalls. Sophos scanned 583 computers for 40 days and found that 81 percent of the machines failed one or more basic security checks. Most machines, 63 percent, were lacking security patches for the operating system, office application and programs like Windows Media Player and Adobe Flash. More than half, 51 percent, had disabled their firewall and another 15 percent had outdated or disabled antivirus and anti-spam software.

Those are exactly the folks that criminals love.

“These people are going to go for the low-hanging fruit and unfortunately there is a lot of it out there,” said Santorelli. “There are so many machines without updated AV on it.”

If your patching system isn’t automated, your users need to be made aware of the risks they are taking by working with unpatched and out-dated security technologies. And while security updates are not the cure-all for malware infection, Santorelli said they certainly serve as a strong deterrent.

“If you are walking down the street as a burglar and you see a house with a Rottweiler, and a visible sign from a security company, you probably won’t attack that house,” he noted.

Tip 2: Use the latest browser versions

Staying away from dubious sites and sticking to known brands used to offer reasonable online safety. Unfortunately, that’s less and less foolproof.

“It used to be that if you surfed to places like CNN, or the Weather Channel, you weren’t going to come across great deal of malware,” said Santorelli. “That isn’t the case anymore. We’ve seen a number of cases recently where people have gone to a legitimate web site and there is an advertisement up there hosting some kind of malicious code.”

That is where the latest safe browsing technologies can help, said Santorelli. The latest versions of today’s browsers will often flag potentially dangerous content.

“Browsers are so much more secure now that so many of the holes that existed in these browsers have been patched. There is also a great deal of anti-phishing and anti malware that goes into them now. So if you try and go to a link that contains malware, your AV might not pick it up. But your browser will say: “Are you sure?”

The good news is most browsers are free. You can download the latest version of Internet Explorer or Firefox fairly easily and quickly, too (See: IE or Firefox: Which is More Secure?).

“It will only take you five minutes to have the latest browser technology,” said Santorelli. “It is just another string to your bow, so to speak.”

“Don’t just blindly click on things and rely on other people to protect your computer,” noted Santorelli. “You’ve got to take some responsibility for your own security.”

Team Cymru research reveals that the most common attack vectors for installing malware continue to be links in emails, or drive-by downloads.

“We know from our recent investigations that there is a great deal of success to be had [for hackers] by just sending links out,” he said.

Just because you receive the email from someone you know and trust, it doesn’t mean it is safe. This includes friends and family, whose systems or accounts may have been compromised, and also well-known web sites you use, like social networking sites or banks. See Five More Facebook, Twitter Scams to Avoid for examples of current attempts to exploit social media sites. And large banks, such as Bank of America, often find their name is used in email phishing scams where thieves send out messages warning that customers their account has been compromised with a link that leads to a fake, but very legitimate-looking login screen.

Of course, whether or not you should click any link or attachment also depends on if you have complied with steps 1 and 2 above.

“You’re going to have to take it on a case-by-case basis,” said Santorelli “And my concern would be significantly raised if I didn’t have my computer up to date with antivirus and browsing technologies.”