<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" media="screen" href="/~d/styles/rss2full.xsl"?><?xml-stylesheet type="text/css" media="screen" href="http://feeds.feedburner.com/~d/styles/itemcontent.css"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/" version="2.0">
  <channel>
    <title>StopBadware Blog</title>
    <link>http://blog.stopbadware.org</link>
    
    <language>en-us</language>
    <ttl>40</ttl>
    <description>Regaining Control of Our Computers</description>
    <atom10:link xmlns:atom10="http://www.w3.org/2005/Atom" rel="self" type="application/rss+xml" href="http://feeds.feedburner.com/StopbadwareBlog" /><feedburner:info xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0" uri="stopbadwareblog" /><atom10:link xmlns:atom10="http://www.w3.org/2005/Atom" rel="hub" href="http://pubsubhubbub.appspot.com/" /><item>
      <title>StopBadware welcomes new developer</title>
      <description>&lt;p&gt;
	StopBadware is pleased to welcome Matthew Shanley, our new lead developer! As we mentioned previously, our current lead developer, Brandon, will be heading off soon to tortue himself for three years as a law student.&lt;/p&gt;
&lt;p&gt;
	Matt joins us from Constant Contact, where he worked on their web development team. He holds a Master&amp;rsquo;s of Fine Arts in Interrelated Media from Massachusetts College of Art and Design, a Bachelor&amp;rsquo;s of Science in Electronic Media, Art, and Communication from Rensselaer Polytechnic Institute, and also attended Cornell University. He&amp;#39;s also an all-around cool guy, and we&amp;#39;re glad to have him on the team!&lt;/p&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=yqr2UnG31Jc:hOLuVF7SyA8:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=yqr2UnG31Jc:hOLuVF7SyA8:qj6IDK7rITs"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=qj6IDK7rITs" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/StopbadwareBlog/~4/yqr2UnG31Jc" height="1" width="1"/&gt;</description>
      <pubDate>Wed, 14 Jul 2010 16:18:00 -0400</pubDate>
      <guid isPermaLink="false">urn:uuid:39e4d19a-6122-4764-a68f-a31d0ca4756b</guid>
      <comments>http://blog.stopbadware.org/2010/07/14/stopbadware-welcomes-new-developer#comments</comments>
      <category>stopbadware</category>
      <link>http://blog.stopbadware.org/2010/07/14/stopbadware-welcomes-new-developer</link>
    </item>
    <item>
      <title>Establishing expectations for AV vendors</title>
      <description>&lt;p&gt;
	At StopBadware, we&amp;#39;re currently revising our guidelines for badware applications. The goal of these guidelines is to distinguish between applications that are badware (defined as &amp;quot;software that fundamentally disregards a user&amp;#39;s choice about how his or her computer or network connection is used&amp;quot;) and those that aren&amp;#39;t. One major reason for distinguishing badware from non-badware applications is to help people make informed choices before installing software that may compromise their privacy or security. &lt;/p&gt;
&lt;p&gt;
	It is in this context that we ask a question that has been troubling us: &lt;strong&gt;if a &amp;quot;legitimate&amp;quot; anti-virus or security product has to send data about your computer use (e.g., your web search or browsing history) back to the vendor&amp;#39;s servers to protect you as promised, how clearly should that data usage be disclosed?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	Historically, we have thought of surreptitious collection of this type of data as a badware behavior. But what if the data isn&amp;#39;t really being collected or used in any nefarious way, and the transmission of the data is necessary to make the product work as intended?&lt;/p&gt;
&lt;p&gt;
	Consider a product like McAfee SiteAdvisor, a free browser plug-in that informs you of the safety of websites as you visit them or while browsing through search results. SiteAdvisor has to query a McAfee server with the URL (or the hash of the URL) of every site you visit or find during a search.&amp;nbsp; This means that, if McAfee wanted to (or if a rogue employee gained access), a profile of your browsing history could be compiled and tied back to your IP address. Yet this is never disclosed in any visible way prior to or during installation. In fact, it&amp;#39;s not even in the Privacy Policy. (It could be considered covered by a vague provision in the EULA about the collection of personal information from your computer necessary to the function of McAfee&amp;#39;s security products.)&lt;/p&gt;
&lt;p&gt;
	This is not unique to SiteAdvisor. Many AV products now query a centralized database about URLs and/or executables to ensure users are protected. In our experience, most of these products fail to disclose this potential threat to a user&amp;#39;s privacy in any meaningful way.&lt;/p&gt;
&lt;p&gt;
	So, back to the question. Is this a badware behavior, one that in this case is being perpetuated by several well-respected software companies? Or is it reasonable to expect that users either know or wouldn&amp;#39;t care that their security comes at the price of a company having access to some private data? Is it dependent on the trustworthiness of the vendor or the stated use of the data once it&amp;#39;s been received? What should we expect as a &lt;em&gt;minimum&lt;/em&gt; bar from AV vendors whose products behave in this way?&lt;/p&gt;
&lt;p&gt;
	Please let us know your thoughts in the comments!&lt;/p&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=e1UwuBawb0U:iyyMcLJgAQ4:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=e1UwuBawb0U:iyyMcLJgAQ4:qj6IDK7rITs"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=qj6IDK7rITs" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/StopbadwareBlog/~4/e1UwuBawb0U" height="1" width="1"/&gt;</description>
      <pubDate>Wed, 07 Jul 2010 11:02:00 -0400</pubDate>
      <guid isPermaLink="false">urn:uuid:e00ec90e-c5f5-4412-90da-17c812320c1a</guid>
      <comments>http://blog.stopbadware.org/2010/07/07/establishing-expectations-for-av-vendors#comments</comments>
      <category>guidelines</category>
      <category>policy</category>
      <category>antivirus</category>
      <link>http://blog.stopbadware.org/2010/07/07/establishing-expectations-for-av-vendors</link>
    </item>
    <item>
      <title>What We Learned at ThePlanet (AS21844)</title>
      <description>&lt;p&gt;
	After months of looking into the infections of AS21844 (ThePlanet) we&amp;#39;ve decided to wrap up our investigations for now. &amp;nbsp;We have learned quite a bit from our communications with customers at ThePlanet. &amp;nbsp;While no one from ThePlanet has spoken with us officially we have learned that they possess a direct feed of infected URLs from Google. &amp;nbsp;This means that large customers of ThePlanet, such as HostGator, should have the ability to learn of infections directly from their provider. &amp;nbsp;Also partners such as Skenzo should be able to use the same list to purge previously infected, and now abandoned, domains from their monetization framework. &amp;nbsp;&lt;/p&gt;
&lt;div&gt;
	For those of you that look at our Top 50 Infected Networks you&amp;#39;ll notice that ThePlanet is still at the top. &amp;nbsp;There really should be an asterisk up there since some of those infections shouldn&amp;#39;t be counted. &amp;nbsp;In particular the Skenzo related infections aren&amp;#39;t actually a threat but are still listed due to a policy decision by the Safe Browsing team (which you can read about in a &lt;a href="http://blog.stopbadware.org/2010/04/27/update-on-sustained-infections-at-theplanet-skenzo-and-host-gator" id="b9:q" title="previous blog post"&gt;previous blog post&lt;/a&gt;). &amp;nbsp;The best solution for now is to get this list to Skenzo so they can remove it from their framework. &amp;nbsp;I am preparing this list for Skenzo right now but eventually, I hope, ThePlanet will provide it for them. &amp;nbsp;To add some transparency to our research I&amp;#39;ll paste the top infected org names as reported by ThePlanet&amp;#39;s RWhois server:&lt;/div&gt;
&lt;p&gt;
	&amp;nbsp;&lt;/p&gt;
&lt;table border="0" cellpadding="0" cellspacing="0" class="zeroBorder" width="359"&gt;
	&lt;tbody&gt;
		&lt;tr height="13"&gt;
			&lt;td class="xl24" height="13" width="317"&gt;
				WebsiteWelcome&lt;/td&gt;
			&lt;td align="right" class="xl25" width="42"&gt;
				7909&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr height="13"&gt;
			&lt;td class="xl26" height="13"&gt;
				Skenzo FZE&lt;/td&gt;
			&lt;td align="right" class="xl27"&gt;
				2838&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr height="13"&gt;
			&lt;td align="right" class="xl26" height="13"&gt;
				Unidentified&lt;/td&gt;
			&lt;td align="right" class="xl27"&gt;
				683&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr height="13"&gt;
			&lt;td class="xl26" height="13"&gt;
				Site5 LLC&lt;/td&gt;
			&lt;td align="right" class="xl27"&gt;
				430&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr height="13"&gt;
			&lt;td class="xl26" height="13"&gt;
				Bahram Boutorabi&lt;/td&gt;
			&lt;td align="right" class="xl27"&gt;
				192&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr height="13"&gt;
			&lt;td class="xl26" height="13"&gt;
				SiteGround.com Inc.&lt;/td&gt;
			&lt;td align="right" class="xl27"&gt;
				171&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr height="13"&gt;
			&lt;td class="xl26" height="13"&gt;
				webserver-a-rackshack.directi.com&lt;/td&gt;
			&lt;td align="right" class="xl27"&gt;
				166&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr height="13"&gt;
			&lt;td class="xl26" height="13"&gt;
				Mochanin Corp&lt;/td&gt;
			&lt;td align="right" class="xl27"&gt;
				136&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr height="13"&gt;
			&lt;td class="xl26" height="13"&gt;
				maktoob.com&lt;/td&gt;
			&lt;td align="right" class="xl27"&gt;
				119&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr height="13"&gt;
			&lt;td class="xl26" height="13"&gt;
				server sea&lt;/td&gt;
			&lt;td align="right" class="xl27"&gt;
				115&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr height="13"&gt;
			&lt;td class="xl26" height="13"&gt;
				Payam Torkian&lt;/td&gt;
			&lt;td align="right" class="xl27"&gt;
				115&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr height="13"&gt;
			&lt;td class="xl26" height="13"&gt;
				Our Internet_ Inc&lt;/td&gt;
			&lt;td align="right" class="xl27"&gt;
				112&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;
	&amp;nbsp;&lt;/p&gt;
&lt;div&gt;
	Don&amp;#39;t forget that some of the 7,909 infections listed as HostGator (WebsiteWelcome is the org name used by HostGator) are duplicates. &amp;nbsp;Our hosting providers tend to include multiple pages (and/or directories) per website host so these numbers require additional explanation. &amp;nbsp;If one were to sort the infections by unique domains alone the count would be noticeably less. &amp;nbsp;Applying some command line fu to one of the data files shows us the repetition is not nearly as high as it used to be. &amp;nbsp; Only four domains are repeated more than 10 times.&lt;/div&gt;
&lt;p&gt;
	&amp;nbsp;&lt;/p&gt;
&lt;table border="1" bordercolor="#000000" cellpadding="3" cellspacing="0" id="pqt9"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;
				count&lt;/td&gt;
			&lt;td&gt;
				domain&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;
				10&lt;/td&gt;
			&lt;td&gt;
				vadakarapally.org&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;
				12&lt;/td&gt;
			&lt;td&gt;
				attorney2traffic.org&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;
				16&lt;/td&gt;
			&lt;td&gt;
				e-sense.tv&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;
				17&lt;/td&gt;
			&lt;td&gt;
				niftysensex.com&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;
	&lt;br /&gt;
	HostGator has roughly 7,563 unique infected domains according to our last count and ThePlanet has 20,298 unique infected domains with their true number likely around 17,000 (adjusting for Skenzo). &amp;nbsp;Where does that put ThePlanet in the context of our top 50 infected networks? &amp;nbsp;Exactly where they are now actually. The next closest network is GoDaddy&amp;#39;s AS26496 with 11,576 infections.&lt;/p&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=n3vYsAVecTk:wbgRCQO079M:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=n3vYsAVecTk:wbgRCQO079M:qj6IDK7rITs"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=qj6IDK7rITs" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/StopbadwareBlog/~4/n3vYsAVecTk" height="1" width="1"/&gt;</description>
      <pubDate>Tue, 06 Jul 2010 12:03:00 -0400</pubDate>
      <guid isPermaLink="false">urn:uuid:510fc74e-adbb-4d45-a452-4f639a6e8bac</guid>
      <comments>http://blog.stopbadware.org/2010/07/06/what-we-learned#comments</comments>
      <category>research</category>
      <category>AS21844</category>
      <category>webidemiology</category>
      <category>ThePlanet</category>
      <link>http://blog.stopbadware.org/2010/07/06/what-we-learned</link>
    </item>
    <item>
      <title>AV vendors say most badware sites are compromised</title>
      <description>&lt;p&gt;
	A &lt;a href="http://www.symantec.com/connect/de/blogs/use-legitimate-sites-malicious-web-attacks"&gt;recent report from Symantec&lt;/a&gt; reinforces the idea that most web-based malware is distributed via compromised, legitimate sites:&lt;/p&gt;
&lt;p style="margin-left: 40px;"&gt;
	In 2010 so far, using the same approach, the proportion of malicious domains that are legitimate [i.e., set up for reasons other than distributing malware] has increased dramatically compared to last year &amp;ndash; it&amp;rsquo;s now about 90%.&lt;/p&gt;
&lt;p&gt;
	On a related note, &lt;a href="http://www.avast.com/pr-legitimate-websites-outscore-the-adult"&gt;Avast reports&lt;/a&gt; that, despite popular belief, adult sites are not carrying the load of malicious content:&lt;/p&gt;
&lt;p style="margin-left: 40px;"&gt;
	...the statistics are clear - for every infected adult domain we identify there are 99 others with perfectly legitimate content that are also infected.&lt;/p&gt;
&lt;p&gt;
	Everyday Internet users who are hearing this for the first time should take this as a wake-up call. &lt;a href="http://www.stopbadware.org/home/badware_prevent"&gt;Protect your computer&lt;/a&gt;. &lt;a href="http://www.stopbadware.org/home/security"&gt;Protect your website&lt;/a&gt;. And recognize that, while making smart decisions about your Internet use is always a critical part of security, deciding which &lt;em&gt;type&lt;/em&gt; of website you visit isn&amp;#39;t as important as it once was.&lt;/p&gt;
&lt;p&gt;
	&lt;em&gt;Hat tip: &lt;a href="http://www.h-online.com/security/news/item/Trojan-attacks-now-almost-solely-from-legitimate-websites-1031631.html"&gt;H-Online&lt;/a&gt; via &lt;a href="http://www.twitter.com/unmaskparasites"&gt;UnmaskParasites (Twitter)&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=M3tPE2gIMAs:BLwziZQpd00:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=M3tPE2gIMAs:BLwziZQpd00:qj6IDK7rITs"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=qj6IDK7rITs" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/StopbadwareBlog/~4/M3tPE2gIMAs" height="1" width="1"/&gt;</description>
      <pubDate>Fri, 02 Jul 2010 09:02:00 -0400</pubDate>
      <guid isPermaLink="false">urn:uuid:b4589153-e2f7-405f-a3c9-fb9a49a990c1</guid>
      <comments>http://blog.stopbadware.org/2010/07/02/av-vendors-say-most-badware-sites-are-compromised#comments</comments>
      <category>badware</category>
      <category>trends</category>
      <link>http://blog.stopbadware.org/2010/07/02/av-vendors-say-most-badware-sites-are-compromised</link>
    </item>
    <item>
      <title>WEIS Recap: Review of "Might Governments Clean Up Malware?"</title>
      <description>&lt;div&gt;
Richard Clayton wrote on the more interesting papers presented at &lt;span class="caps"&gt;WEIS&lt;/span&gt;. &amp;nbsp;In his paper &lt;a href="http://weis2010.econinfosec.org/papers/session4/weis2010_clayton.pdf"&gt;&amp;#8220;Might Government Clean Up Malware&amp;#8221;&lt;/a&gt; [pdf] he suggests some possible goverment intervention to aid consumers in cleaning up their computers. &amp;nbsp;His paper explains the reasons as follows. &amp;nbsp;
&lt;/div&gt;
&lt;div&gt;
1) ISPs do not have an incentive to act
&lt;/div&gt;
&lt;div&gt;
2) The problem has public dimensions very similar to public health issues
&lt;/div&gt;
&lt;div&gt;
3) The math behind this issue requires someone (the government) to seed the funding for experts to act
&lt;/div&gt;
&lt;div&gt;
I agree with the contention that ISPs do not have incentives to act. &amp;nbsp;Of the web hosts that I have communicated with not a single one has found it financially rewarding to deal with the problems I highlight. &amp;nbsp;This really isn&amp;#8217;t how it is supposed to work either. &amp;nbsp;As Clayton points out &amp;#8220;in principle the market should deal with ISPs who skimp on abuse activity.&amp;#8221; &amp;nbsp;Which put another way means that those ISPs who do actively clean up infections in their consumer base should have a better image and thus more business. &amp;nbsp;The market should reward those ISPs who go out of their way to make sure that its customers remain protected. &amp;nbsp;But as pointed out in many of the papers who grace &lt;span class="caps"&gt;WEIS&lt;/span&gt; and other conferences like it the margins are extremely slim.
&lt;/div&gt;
&lt;div&gt;
Clayton&amp;#8217;s paper even references &amp;nbsp;another paper which makes the claim that a single interaction with a customer by an &lt;span class="caps"&gt;ISP&lt;/span&gt; will eat up all of the profit generated by that customer for the entire year. &amp;nbsp;(In a footnote he mentions that this may be exaggerated but not greatly so) &amp;nbsp;
&lt;/div&gt;
&lt;div&gt;
The one issue I have with this paper is that it doesn&amp;#8217;t quite cover the issue I&amp;#8217;m most concerned about. &amp;nbsp;And obviously that isn&amp;#8217;t a valid criticism of the paper so much as a want from my side. &amp;nbsp;The paper deals with helping out web &amp;#8220;surfers&amp;#8221; instead of web masters. &amp;nbsp;Often the problem that I&amp;#8217;m studying involves both levels. &amp;nbsp;Web sites are infected because the web master&amp;#8217;s personal computer was infected and the attacker gathered the login details from there. &amp;nbsp;So fixing one may in fact help fix the other. &amp;nbsp;But there is a major difference worth noting. &amp;nbsp;The paper made a good point in writing about the hesitation of an &lt;span class="caps"&gt;ISP&lt;/span&gt; in engaging with its customers this way. &amp;nbsp;When margins are thin profit is only acceptable through volume. &amp;nbsp;So any actions which drive customers away in any number are dangerous. &amp;nbsp;Accusing customers of infections isn&amp;#8217;t always rewarded with gratitude. &amp;nbsp;Customers can feel angry, ashamed, alienated or all three at once. &amp;nbsp;It is difficult to find new options for bandwidth provision for many people. &amp;nbsp;In Cambridge I have my choice between one cable company and two &lt;span class="caps"&gt;DSL&lt;/span&gt; (one who just resells the others at a mark up). &amp;nbsp;And the change from cable to &lt;span class="caps"&gt;DSL&lt;/span&gt; (or vice versa) comes with considerable costs as well. &amp;nbsp;But for web hosting providers there isn&amp;#8217;t that much cost and there are a lot of choices. &amp;nbsp;So the dangers of customer alienation for web hosting firms are very very high. &amp;nbsp;
&lt;/div&gt;
&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=qfhmGOk6Nqo:kXTXV7d5_u0:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=qfhmGOk6Nqo:kXTXV7d5_u0:qj6IDK7rITs"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=qj6IDK7rITs" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/StopbadwareBlog/~4/qfhmGOk6Nqo" height="1" width="1"/&gt;</description>
      <pubDate>Fri, 25 Jun 2010 15:01:00 -0400</pubDate>
      <guid isPermaLink="false">urn:uuid:43613414-f721-4198-a5d9-49dbecd905fa</guid>
      <comments>http://blog.stopbadware.org/2010/06/25/weis-recap-review-of-might-governments-clean-up-malware#comments</comments>
      <link>http://blog.stopbadware.org/2010/06/25/weis-recap-review-of-might-governments-clean-up-malware</link>
    </item>
    <item>
      <title>Australian ISPs on the right track</title>
      <description>&lt;p&gt;	In early June, the Australian Internet Industry Association, an &lt;span class="caps"&gt;ISP&lt;/span&gt; industry trade group, published &lt;a href="http://iia.net.au/images/resources/pdf/icode-v1.pdf"&gt;icode&lt;/a&gt; [&lt;span class="caps"&gt;PDF&lt;/span&gt;], a voluntary code of conduct for ISPs to follow to better fight bots on their networks. Like the &lt;a href="http://blog.stopbadware.org/2009/11/10/isps-and-the-fight-against-bots"&gt;previously-mentioned &lt;span class="caps"&gt;IETF&lt;/span&gt; draft&lt;/a&gt;, this document lays out a rationale for, and recommendations on how to implement, an &lt;span class="caps"&gt;ISP&lt;/span&gt;-level response to bots. Unlike the &lt;span class="caps"&gt;IETF&lt;/span&gt; draft, icode is a reflection of a coordinated effort by a large number of ISPs to buy in to a common framework for how to respond.&lt;/p&gt;
&lt;p&gt;	The icode framework has four parts:&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;		Education. ISPs that adopt icode are expected to educate their customers about keeping their computers from becoming compromised.&lt;/li&gt;
	&lt;li&gt;		Detection. ISPs can implement their own detection methods and/or get data from trusted third parties. Even better, they can get data from the &lt;a href="http://www.acma.gov.au/WEB/STANDARD/pc=PC_310317"&gt;Australian Internet Security Initiative&lt;/a&gt;, a government-led effort to centralize bot reporting by collecting bot reports from trusted providers and then distributing &lt;span class="caps"&gt;ISP&lt;/span&gt;-specific data daily to participating ISPs. (Wouldn&amp;#8217;t it be great if we had something like this for infected URLs and hosting companies?)&lt;/li&gt;
	&lt;li&gt;		Action. ISPs are encouraged to act on the information about bots, through whatever combination of customer notification, password resets, bandwidth throttling, walled garden quarantining, smtp blocking, or other measures they consider appropriate.&lt;/li&gt;
	&lt;li&gt;		Reporting. ISPs are expected to report &amp;#8220;significant cyber security incidents&amp;#8221; to governments.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;	icode also recommends, though doesn&amp;#8217;t require, that participating ISPs share threat data with each other, facilitated by the Australian &lt;span class="caps"&gt;CERT&lt;/span&gt;.&lt;/p&gt;
&lt;p&gt;	One could quibble over some of the details, but it&amp;#8217;s clear that the Australian ISPs that created and will be adopting icode are light years ahead of most ISPs (and web hosting providers) globally in tackling the spread of malware.&lt;/p&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=i68DO3XSD30:_KyCeZtmHh4:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=i68DO3XSD30:_KyCeZtmHh4:qj6IDK7rITs"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=qj6IDK7rITs" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/StopbadwareBlog/~4/i68DO3XSD30" height="1" width="1"/&gt;</description>
      <pubDate>Thu, 17 Jun 2010 10:17:00 -0400</pubDate>
      <guid isPermaLink="false">urn:uuid:c62ba4c7-f83b-4ffe-905e-bfa00d40168d</guid>
      <comments>http://blog.stopbadware.org/2010/06/17/australian-isps-on-the-right-track#comments</comments>
      <category>isp</category>
      <category>australia</category>
      <category>badware</category>
      <category>policy</category>
      <link>http://blog.stopbadware.org/2010/06/17/australian-isps-on-the-right-track</link>
    </item>
    <item>
      <title>Recent spikes in badware reports</title>
      <description>&lt;p&gt;We have generally seen an increase in the number of badware URLs reported by our data providers lately, but in the past few weeks, we&amp;#8217;ve seen unusually big spikes on three autonomous systems (simplifying slightly, an AS is a set of networks operated by a single entity):&lt;br /&gt;
&lt;br /&gt;
AS16276 (&lt;span class="caps"&gt;OVH&lt;/span&gt;) &lt;a href="http://stopbadware.org/reports/asn/16276"&gt;graph&lt;/a&gt;&lt;br /&gt;
AS9809 (Nova Network, China) &lt;a href="http://stopbadware.org/reports/asn/9809"&gt;graph&lt;/a&gt;&lt;br /&gt;
AS22489 (Castle Access) &lt;a href="http://stopbadware.org/reports/asn/22489"&gt;graph&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;We have attempted to notify all three network operators via abuse@&lt;i&gt;domain_name&lt;/i&gt;. The report to abuse@nova.net.cn bounced, so if you know another contact address there, please let us know.&lt;/p&gt;
&lt;p&gt;Most likely, these spikes in infection numbers are the result of either targeted attacks at these networks or opportunistic attacks that happened to find their way into large numbers of identically configured (or misconfigured) web servers.&lt;/p&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=AcsrUC7ZIk0:g29UcIo1V_A:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=AcsrUC7ZIk0:g29UcIo1V_A:qj6IDK7rITs"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=qj6IDK7rITs" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/StopbadwareBlog/~4/AcsrUC7ZIk0" height="1" width="1"/&gt;</description>
      <pubDate>Wed, 16 Jun 2010 16:12:00 -0400</pubDate>
      <guid isPermaLink="false">urn:uuid:97fb3ead-f1c0-4d40-8b55-2b66d0d5f35c</guid>
      <comments>http://blog.stopbadware.org/2010/06/16/recent-spikes-in-badware-reports#comments</comments>
      <category>attacks</category>
      <link>http://blog.stopbadware.org/2010/06/16/recent-spikes-in-badware-reports</link>
    </item>
    <item>
      <title>StopBadware welcomes a new board member</title>
      <description>&lt;p&gt;StopBadware is pleased to announce that Paul Mockapetris will join our&lt;br /&gt;
board of directors.&lt;/p&gt;
&lt;p&gt;Mockapetris created the Domain Name System (&lt;span class="caps"&gt;DNS&lt;/span&gt;), an essential part of &lt;br /&gt;
today&amp;#8217;s Internet infrastructure, in the 1980s. He is now the Chief &lt;br /&gt;
Scientist and Chairman of the Board at Nominum, a global provider of &lt;span class="caps"&gt;DNS&lt;/span&gt; &lt;br /&gt;
and &lt;span class="caps"&gt;DHCP&lt;/span&gt; solutions to communication providers. He has previously served &lt;br /&gt;
as chair of the Internet Engineering Task Force (&lt;span class="caps"&gt;IETF&lt;/span&gt;) and as a program &lt;br /&gt;
manager at the Advanced Research Projects Agency (&lt;span class="caps"&gt;ARPA&lt;/span&gt;).&lt;/p&gt;
&lt;p&gt;The board, chaired by PayPal &lt;span class="caps"&gt;CISO&lt;/span&gt; Michael Barrett, also includes Vint &lt;br /&gt;
Cerf, Esther Dyson, John Palfrey, Ari Schwartz, Mike Shaver, and &lt;br /&gt;
executive director Maxim Weinstein.&lt;/p&gt;
&lt;p&gt;Press release: &lt;a href="http://www.stopbadware.org/home/pr_06112010"&gt;http://www.stopbadware.org/home/pr_06112010&lt;/a&gt;&lt;/p&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=fQjcY2TUN8A:Sdd1L6dQFVA:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=fQjcY2TUN8A:Sdd1L6dQFVA:qj6IDK7rITs"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=qj6IDK7rITs" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/StopbadwareBlog/~4/fQjcY2TUN8A" height="1" width="1"/&gt;</description>
      <pubDate>Fri, 11 Jun 2010 11:21:00 -0400</pubDate>
      <guid isPermaLink="false">urn:uuid:365091f0-d068-4473-b23b-c667ab87400b</guid>
      <comments>http://blog.stopbadware.org/2010/06/11/stopbadware-welcomes-a-new-board-member#comments</comments>
      <link>http://blog.stopbadware.org/2010/06/11/stopbadware-welcomes-a-new-board-member</link>
    </item>
    <item>
      <title>Thoughts on WEIS 2010</title>
      <description>&lt;p&gt;Earlier this week I sat in on the Workshop on the Economics of Information Security. &amp;nbsp;One of the more lively research papers presented was on insecurities in the online pornography industry. &amp;nbsp;The paper  &lt;sup class="footnote" id="fnr0"&gt;&lt;a href="#fn0"&gt;0&lt;/a&gt;&lt;/sup&gt; has also been written about by Threatpost &lt;sup class="footnote" id="fnr1"&gt;&lt;a href="#fn1"&gt;1&lt;/a&gt;&lt;/sup&gt;. &amp;nbsp;As noted by Naraine&amp;#8217;s article the team crawled just over 35,000 websites using an automated system. &amp;nbsp;Interestingly the team discovered that about 3.23% of those sites were also infected with drive by downloads. &amp;nbsp;One aspect of the research I was curious about was the degree to which those infected porn sites were popular. &amp;nbsp;I spoke with Dr Wondracek after his talk to speak about the possibility of figuring this out. &amp;nbsp;In my own thesis last semester I discovered that of the sampled sites we receive from our data partners less than 3% of the those were listed as popular by Alexa.&lt;br /&gt;
&lt;div&gt;&lt;br /&gt;
  To determine this one simply downloads Alexa&amp;#8217;s  &amp;#8220;Top 1,000,000 Websites&amp;#8221; list &lt;sup class="footnote" id="fnr2"&gt;&lt;a href="#fn2"&gt;2&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;and formats the list for comparison appropriately. &amp;nbsp;(Alexa&amp;#8217;s list uses canonical hostnames) Then simply take the intersection of that list (find which hostnames appear on list A and list B) and use that to create a percentage. &amp;nbsp;This statistic should answer Pr(Popularity|Infection) or the probability of popularity given an infection.&lt;br&gt;&lt;/p&gt;
&lt;p&gt;[edit: moved links to bottom in footnote format for better readability]&lt;br /&gt;
&lt;sup class="footnote" id="fnr0"&gt;&lt;a href="#fn0"&gt;0&lt;/a&gt;&lt;/sup&gt; http://weis2010.econinfosec.org/papers/session2/weis2010_wondracek.pdf &lt;br&gt;
&lt;sup class="footnote" id="fnr1"&gt;&lt;a href="#fn1"&gt;1&lt;/a&gt;&lt;/sup&gt; http://threatpost.com/en_us/blogs/understanding-porn-malware-connections-060810&lt;br&gt;
&lt;sup class="footnote" id="fnr2"&gt;&lt;a href="#fn2"&gt;2&lt;/a&gt;&lt;/sup&gt; http://s3.amazonaws.com/alexa-static/top-1m.csv.zip &lt;br&gt;&lt;/p&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=hgTCNr3MJr8:IFWUtvlYCUo:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=hgTCNr3MJr8:IFWUtvlYCUo:qj6IDK7rITs"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=qj6IDK7rITs" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/StopbadwareBlog/~4/hgTCNr3MJr8" height="1" width="1"/&gt;</description>
      <pubDate>Wed, 09 Jun 2010 10:58:00 -0400</pubDate>
      <guid isPermaLink="false">urn:uuid:1a259a36-ab4a-4a08-a204-782a3207bc76</guid>
      <comments>http://blog.stopbadware.org/2010/06/09/thoughts-on-weis-2010#comments</comments>
      <category>webidemiology</category>
      <category>statistics</category>
      <category>porn</category>
      <link>http://blog.stopbadware.org/2010/06/09/thoughts-on-weis-2010</link>
    </item>
    <item>
      <title>A Detailed Look at ThePlanet's Infection Distribution</title>
      <description>A reader asked a question in the comments of the previous blog post about ThePlanet regarding the distribution of infections. &amp;nbsp;The reader wanted to know if the rest of the infections not attributed to Skenzo and HostGator were evenly distributed with less than 10% of the total infections. &amp;nbsp;The type of distribution the reader was describing is called a &lt;a href=http://en.wikipedia.org/wiki/Power_law id=sxz_ title="Power Law"&gt;Power Law&lt;/a&gt; distribution. &amp;nbsp;A power law distributed population will look something like this:

&lt;div id=ajjc style=TEXT-ALIGN:left&gt;

  &lt;img src="http://blog.stopbadware.org/files/dgs5vv6f_1ghg49dhb_b.png"  alt="power law" /&gt;

&lt;/div&gt;

courtesy of Wikipedia.org&lt;br&gt;

&lt;br&gt;

For this blog post I'm using data pulled from early May 2010 on AS21844 (ThePlanet) and find the infection counts are roughly power law distributed. &amp;nbsp;I've gone over the methodology to obtain this data in previous posts but it bears mentioning that I am using data distributed by RWhois organization names. &amp;nbsp;Later in this post I will look at the same data distributed by only IP address so that it can be compared with other AS blocks. &amp;nbsp;The raw infection counts look like this in graphical format:&lt;br&gt;

&lt;div id=ndp7 style=TEXT-ALIGN:left&gt;

    &lt;img src="http://blog.stopbadware.org/files/dgs5vv6f_2sxb22vcw_b.png"  alt="raw data plot" /&gt;

&lt;/div&gt;

The shape is precisely the same and it is obvious that there are a lot of organizations that have only single and double digit infections attributed to them. &amp;nbsp;The area between 500 and 2500 is entirely barren with only a single entry beyond 2500. &amp;nbsp;One of the issues when looking at data like this is the blur of data points below the 500 marker. &amp;nbsp;One could simply strip away the outliers (those data points above 500) but in this particular case I don't think that is an effective way to view the data. &amp;nbsp;In statistics people often "transform" the data to deal with this situation. &amp;nbsp;This generally means they divide all the numbers by some constant which allows the data to retain the same shape but become easier to read. &amp;nbsp;I generally favor the log/log method which means I take the log of each number and graph it that way. &amp;nbsp;Log (or logarithm) is a mathematical function best &lt;a href=http://en.wikipedia.org/wiki/Logarithm id=fqe7 title="explained by Wikipedia"&gt;explained by Wikipedia&lt;/a&gt; but best thought of as a number "reducer" that can be applied uniformly across data.&lt;br&gt;

&lt;br&gt;

To get a sense of the scale the log of 2500 is 7.8, the log of 500 is 6.2, the log of 100 is 4.6 and the log of 1 is 0. &amp;nbsp;Once the data is transformed we can see there is a little variance in the actual distribution but the fact that the line is sloping downward like that is another very good indicator of the power law distribution.&lt;br&gt;

&lt;div id=f0ku style=TEXT-ALIGN:left&gt;

  &lt;img src="http://blog.stopbadware.org/files/dgs5vv6f_3dsfhwhhd_b.png" alt="log/log data plot" /&gt;

&lt;/div&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=f5euCT3QwOQ:qwiyBWhUUzY:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/StopbadwareBlog?a=f5euCT3QwOQ:qwiyBWhUUzY:qj6IDK7rITs"&gt;&lt;img src="http://feeds.feedburner.com/~ff/StopbadwareBlog?d=qj6IDK7rITs" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/StopbadwareBlog/~4/f5euCT3QwOQ" height="1" width="1"/&gt;</description>
      <pubDate>Tue, 25 May 2010 12:17:00 -0400</pubDate>
      <guid isPermaLink="false">urn:uuid:ee11221a-f941-4d98-b218-e53a1af393aa</guid>
      <comments>http://blog.stopbadware.org/2010/05/25/draft-article-414#comments</comments>
      <category>epidemic</category>
      <category>infections</category>
      <category>ThePlanet</category>
      <category>webidemiology</category>
      <link>http://blog.stopbadware.org/2010/05/25/draft-article-414</link>
    </item>
  </channel>
</rss>
