Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
An Australian woman this month has had her internet connection cut off under the iCode initiative after she received 42 consecutive emails warning that her computer was infected.
The customer of a small unnamed telco had her machine hijacked by a botnet, rendering it what is known as a zombie machine. It then pumped malicious traffic over her internet connection which alerted her ISP.
The woman had struggled to remove the notoriously stubborn malicious fake anti-virus program because it had disabled her legitimate anti-virus software and prevented her from executing applications.
Her internet connection was cut to all but a single web page with the provider, referred to as a walled garden, after she failed to remove the infection.
The telco then phoned her to assist in the removal of the malware.
Internet connections were cut only in the "most severe" cases, iCode chief and former director of the Internet Industry Association (IIA) Peter Coroneos said.
Normally customers would be contacted by phone or email after ISPs detected malicious botnet traffic from their accounts, and then direct to a web page which contains security tools.
Large internet providers typically implemented network traffic analysis and automated email alerts to detect and warn customers of infections.
Smaller telcos often manually examined data, sinkholed botnet traffic and phoned compromised users, Coroneos said.
Recent information from the Australian Communications and Media Authority found the average number of daily reported botnet infections had declined from 16,000, between June 2010 and 2011, to 11500 in July alone this year.
The IIA did not have figures detailing the number of machines cleaned by telcos operating under the iCode.
Australia's voluntary internet industry iCode may be adopted in the US and will be trialled in South Africa under an increasing drive by governments and industry to wipe out botnets.
Some ISPs in South Africa would soon begin trials of the code, Coroneos said.
The US Department of Homeland Security may also adopt the iCode. It flagged the strategy in request for information document issued this month to research ways to reduce botnet infections.
Also flagged was a similar government-run initiative in Japan where botnet infections were discovered in honeypots.
In both initiatives, compromised customers were directed to a web page to download security tools that could remove the infections.
Coroneos said he thought the iCode would fit well with US legal frameworks because the country's largest telco, Comcast, had already implemented a similar in-house framework.
"The internet providers have far from won the fight against botnets, but there is progress and customers are accepting of the iCode," Coroneos said.
The code was pushed out to pre-empt looming government regulation that may have made providers responsible for the security of end-users.
Copyright © SC Magazine, Australia
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.