Crime doesn't pay
At least not at 15 cents a computer
A Texas man has agreed to plead guilty to charges he trained a botnet on a popular internet service provider so he could demonstrate custom-made malware to a potential customer. David Anthony Edwards of Mesquite, Texas admitted that in August 2006 he and alleged accomplice Thomas James Frederick Smith unleashed a flood of data …
i been fighting the original botnet since aug 2008. and everything i touched was infected.
i went through 10 phones, 3 phone companys, 4 machines, 3 hubs and routers and all sorts of electronics. all the details about the worm came from me. the hacker was training others to use the botnet and not be detected. the conficters were made detectable on purpose. i can tell ya how it was back then and how it got to where it is today.
the hacker was going through windstream and used 2 connections. one was higher than boot.
it used dual band radio packet injections using the phone towers. originally, the botnet and hacker used both sides of the connection to break through any security i threw at it.
it kept going to Domain servers and it s eemd the 2000 imcoming ips(from pings from my hub), had an effect i believe to whats called ROOT LAW which was passed.
the hacker used the irc name of FERMANDEZ using the IP from the ICMP packet which started with port 53. the port numbers were actually commands telling the botnet what to do next.
anyways, www.deepandcrazy.com for my worm info... still building it.
after 2 years, eather its gotten for undetecable which was first priority, or i see for the first time some relief coming.
anyways, im gonna fight till i know the original hacker behind this that i been fighting is in jail.
The collateral damage here is thousands of infected PCs, owned by innocent (but ignorant) members of the public, being rented out to the highest bidder.
Execute the guilty slowly and painfully, and show the whole thing on youtube, I say. But then again I am a bit of a softie moderate.
The specific service I have in mind is spending all of each day of the sentance placing orders for spamvertised products using known, bent and blacklisted card details supplied by the FBI.
In between this, carrying on scambaiting conversations by email at length in response to any received 419s.
All to be done manually and while using their real identities.
But I'd make them do community service (cleaning up dog mess, unblocking sewers, etc...) for the total estimated hours of virus cleanup time they stole from other people. Say 1 hour per infected PC, that gives 22000 hours or about 10 years of 8 hours a day.
Jail time is a community expense, and won't teach them much of a lesson...