Smack on the bot for the Beeb

The BBC’s Click program has been getting quite a bit of publicity after it “acquired” a botnet. It used the botnet to send spam (to specially created addresses) and bring down a website (with the consent of the site’s owners). This was all done in the name of consumer education.

Normally, the BBC does a great job telling people about the potential dangers of computing. But this time they’ve gone about it the wrong way. The Computer Misuse Act clearly states that a person is guilty of an offence if “he causes a computer to perform any function with intent to secure access to any program or data held in any computer”.

I’m not a lawyer, and smart lawyers often manage to find loopholes in the law. But I do work for a security company, and it’s my view that the Click guys certainly broke the spirit, if not the letter, of the law.

Accessing other people’s computers is wrong. Accessing other people’s computers to create TV content, even with the best of intentions, is very wrong indeed.

Smack on the bot for the Beeb

Your email address will not be published.



The SessionManager IIS backdoor

In early 2022, we investigated an IIS backdoor called SessionManager. It has been used against NGOs, government, military and industrial organizations in Africa, South America, Asia, Europe, Russia and the Middle East.

APT ToddyCat

ToddyCat is a relatively new APT actor responsible for multiple sets of attacks against high-profile entities in Europe and Asia. Its main distinctive signs are two formerly unknown tools that we call ‘Samurai backdoor’ and ‘Ninja Trojan’.

WinDealer dealing on the side

We have discovered that malware dubbed WinDealer, spread by Chinese-speaking APT actor LuoYu, has an ability to perform intrusions through a man-on-the-side attack.

APT trends report Q1 2022

This is our latest summary of advanced persistent threat (APT) activity, focusing on events that we observed during Q1 2022.

Subscribe to our weekly e-mails

The hottest research right in your inbox