Results 1 to 7 of 7

Thread: Feds to remotely delete Coreflood from infected PCs

  1. #1
    C.U.N.T. Ambassador
    Full Member Status

    Blaze's Avatar
    Member No
    24297
    Join Date
    Jan 2009
    Last Online
    12-10-2014 @ 10:07 PM
    Location
    Directly under God
    Posts
    4,371
    Status
    Offline
    Thanks
    1,191
    Thanked 261 Times in 210 Posts


    Blog Entries
    71
    Rep Power
    22

    Exclamation Feds to remotely delete Coreflood from infected PCs

    In an unusual move, federal authorities will be contacting computer users with systems infected by the Coreflood botnet Trojan and asking them to agree to allow them to send commands to the malware so it will delete itself. The move comes in the in the wake of a coordinated takedown earlier this month by the FBI and other authorities, in which the U.S. government essentially substituted its own command-and-control servers in place of those used by Coreflood and issued commands telling the program to shut down on infected PCs. The move reduced activity from the Coreflood botnet by about 90 percent in the United States and by nearly 75 percent worldwide. However, infected PCs still have dormant Coreflood software on them, and the feds would like to get rid of it.



    A U.S. District Judge approved the Department of Justice’s request for a preliminary injunction that authorizes the action, giving authorities until May 25 to contact owners of systems infected by Coreflood and obtain consent to remotely remove it from their machines. However, the DOJ actually argued it didn’t need a judge’s permission to move on its deletion campaign, since it will be seeking written consent from owners of infected systems before going through with the deletion.

    Based upon technical evaluation and testing, the Government assesses that the command sent to the Coreflood software to stop running will not cause any damage to the victim computers on which the Coreflood software is present, nor will it allow the Government to examine or copy the contents of the victim computers in any fashion.

    Federal authorities have not specified how many machines it has identified as candidates for a remote wipe of Coreflood. Industry estimates of the size of the Coreflood botnet at the time of its takedown were between 2 million and 2.5 million systems.

    The DOJ argues that removing Coreflood quickly from infected systems is important, as new variants of Coreflood are already appearing, increasing the probability that new malware will be able to evade detection, removal tools, or re-capture now-dormant machines. The FBI says in many cases it has already identified infected computers by IP address and identified possible owners based on that information.

    Geoff Duncan – Wed Apr 27, 1:01 pm ET
    Hey Jackass! You need to [Register] or log in to view signatures on ROTHARMY.COM!

  2. #2
    DIAMOND STATUS
    Nitro Express's Avatar
    Member No
    7682
    Join Date
    Aug 2004
    Last Online
    Today @ 02:50 PM
    Location
    Jackson Hole, Wyoming
    Posts
    32,777
    Status
    Offline
    Thanks
    1,438
    Thanked 4,014 Times in 3,249 Posts


    Blog Entries
    15
    Rep Power
    94
    Very strange. I can see the government issuing a heads up warning but unless it's an national security issue, it's not the government's problem. What makes them the sole network security experts? It's a huge private industry which probably has all sorts of people you can hire to take care of the problem. The only reason the FBI should even be going after someone's computer is if they have a warrant to regarding criminal activity or national security. We don't need to waste tax money on the FBi being an internet security company for the private sector.
    Last edited by Nitro Express; 04-28-2011 at 03:18 PM.
    Hey Jackass! You need to [Register] or log in to view signatures on ROTHARMY.COM!

  3. #3
    Perpetually Befuddled
    DIAMOND STATUS
    chefcraig's Avatar
    Member No
    3871
    Join Date
    Apr 2004
    Last Online
    03-01-2017 @ 12:20 PM
    Location
    "A Confederacy Of Dunces"
    Posts
    12,172
    Status
    Offline
    Thanks
    2,724
    Thanked 4,052 Times in 2,583 Posts


    Rep Power
    74
    This is fairly spooky, for a variety of reasons. For one thing, even though you have to sign a consent form, it's still essentially like handing over the keys to your house to a stranger when you need work done. If you are not there to supervise them, you could return and find your possessions, let alone your privacy to have been tampered with. And since they have the keys, a set of duplicates could be made allowing them access at any time. Yeah, yeah, if you have nothing to hide (or of value), you have nothing to worry about, but that still won't make you rest any easier.
    Hey Jackass! You need to [Register] or log in to view signatures on ROTHARMY.COM!

  4. #4
    DIAMOND STATUS
    Nitro Express's Avatar
    Member No
    7682
    Join Date
    Aug 2004
    Last Online
    Today @ 02:50 PM
    Location
    Jackson Hole, Wyoming
    Posts
    32,777
    Status
    Offline
    Thanks
    1,438
    Thanked 4,014 Times in 3,249 Posts


    Blog Entries
    15
    Rep Power
    94
    Plus the US Government has such an impeccable record of being trust worthy.

  5. #5
    Fuck this and fuck that
    ROTH ARMY MODERATOR

    FORD's Avatar
    Member No
    32
    Join Date
    Jan 2004
    Last Online
    Today @ 10:28 PM
    Location
    Cascadia
    Posts
    58,736
    Status
    Online
    Thanks
    3,396
    Thanked 6,297 Times in 4,722 Posts


    Rep Power
    144
    My machines aren't infected with the shit, but if they were, I'd clean them up myself, thanks.
    Hey Jackass! You need to [Register] or log in to view signatures on ROTHARMY.COM!

  6. #6
    Rock God
    DIAMOND STATUS
    Hardrock69's Avatar
    Member No
    11017
    Join Date
    Feb 2005
    Last Online
    03-03-2024 @ 04:13 AM
    Location
    A Small Dive in a trashy neighborhood somewhere on Fornax 9
    Posts
    21,833
    Status
    Offline
    Thanks
    1,570
    Thanked 2,616 Times in 1,647 Posts


    Rep Power
    68
    No shit. Were I to be contacted, I would just tell them "Give me the instructions to delete it myself".

    Seems like a fishing expedition in the guise of "helping innocent victims of this virus".
    Hey Jackass! You need to [Register] or log in to view signatures on ROTHARMY.COM!

  7. #7
    C.U.N.T. Ambassador
    Full Member Status

    Blaze's Avatar
    Member No
    24297
    Join Date
    Jan 2009
    Last Online
    12-10-2014 @ 10:07 PM
    Location
    Directly under God
    Posts
    4,371
    Status
    Offline
    Thanks
    1,191
    Thanked 261 Times in 210 Posts


    Blog Entries
    71
    Rep Power
    22
    Should the computers that have the toxic waste (Coreflood) be prevented from contaminating the Internet by some means, such as containment?

    Should private internet security companies provide a certificate of removal from the computers they monitor? What if that computer is using freeware for security monitoring?
    Last edited by Blaze; 04-28-2011 at 05:51 PM.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. E-coli Infected With Elton...
    By ELVIS in forum House of Music
    Replies: 5
    Last Post: 11-02-2009, 08:32 AM
  2. delete
    By chefcraig in forum House of Music
    Replies: 3
    Last Post: 04-05-2009, 02:27 PM
  3. Delete Your Lies
    By Phil theStalker in forum The Front Line
    Replies: 3
    Last Post: 07-23-2004, 10:35 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •