Anatomy of a Spam Virus

A botnet created by a trojan virus is sometimes referred to as SpamThru.

According to the Don’t Bounce Spam organization, spammers have become very sophisticated in the way they manage their botnets , and the SpamThru Trojan is the leading example. In at least one case the botnet consisted of over 73,000 computers.

SpamThru operates by using a peer-to-peer configuration, but all bots report to a central control server. The bots are separated into different server ports, depending on which variant of the trojan is installed. The bots are further segmented into peer groups of no more than 512 bots. This keeps the exposure overhead involved in exchanging information about other peer connections to a minimum. The SpamThru controller keeps statistics on the country of origin of all bots in the botnet. The SpamThru controller also keeps statistics on what version of Windows each infected client is running, down to the service pack level. The SpamThru bot also has the capability to scan the system for other malware on a system. Imagine the intelligence of people who take the time to develop this type of sophisticated software, which is used for a very foolish purpose. Read the rest of this article>>

Insider: How the basic tech behind the Internet works
Join the discussion
Be the first to comment on this article. Our Commenting Policies