Search: Home Bugtraq Vulnerabilities Mailing Lists Jobs Tools Beta Programs
    Digg this story   Add to  
Report: China's botnet problems grows
Published: 2008-04-21

Computers infected by Trojan horse programs and bot software are the greatest threat to China's portion of the Internet, with compromises growing more than 20-fold in the past year, the nation's Computer Emergency Response Team (CN-CERT) stated in its 2007 annual report released last week.

The response organization found that the number of Chinese Internet addresses with one or more infected systems increased by a factor of 22 in 2007. The report, currently only published in Chinese, estimates that, of 6.23 million bot-infected computers on the Internet, about 3.62 million are in China's address space.

Trojan horse programs are responsible for a range of issues, from privacy breaches to economic losses, CN-CERT said in the report.

"The Trojans (are) also increasingly being used to steal state secrets ... (incurring) incalculable losses," the report stated, according to a Google translation.

The security of Chinese computer has become a concern for many countries as attacks from China have steadily increased. In particular, targeted attacks aimed at large companies and national government systems have, in many cases, led back to an Internet address assigned to the Asian giant. Last year, China's government responded to accusations of state-sponsored information espionage by maintaining that many of China's systems < href="">have been compromised and, thus, are likely forwarding attacks from other countries.

The latest report from CN-CERT found that domain name registration in the nation had almost tripled in the past year. Attacks that tampered with legitimate Web sites grew 1.5 times, and malicious drive-by attacks jumped 2.6 times, according to the paper.

In the past, an English translation of the report has subsequently been published.

A nod to Dancho Danchev's blog, which first noted the release of the report.

If you have tips or insights on this topic, please contact SecurityFocus.

Posted by: Robert Lemos
    Digg this story   Add to  
Comments Mode:


Privacy Statement
Copyright 2009, SecurityFocus