A Peer-to-peer Trojan Horse
A new “Trojan horse” program called Phatbot is spreading across Windows computers connected to the Internet, employing a range of nefarious tactics including some borrowed from the world of peer-to-peer file sharing systems such as Kazaa and the original Napster. According to the Washington Post, which broke the story on March 17, Phatbot can create invisible networks of up to 50 infected machines. This gives the hackers who wrote the program a highly efficient way to issue orders to the machines, in essence recruiting them into an underground hacker army. For example, the networks could be used to launch massive spam or denial-of-service attacks.
The resilient nature of peer-to-peer networks – if one node is removed, communications will simply flow around it – means that security officials will have a very hard time slowing Phatbot’s spread, short of tracking down every single infected machine. Just as alarming, the malicious program can evade and shut down many popular anti-virus programs. But the Post links to several sites where anti-Phatbot programs can be downloaded.
Keep Reading
Most Popular
The inside story of how ChatGPT was built from the people who made it
Exclusive conversations that take us behind the scenes of a cultural phenomenon.
How Rust went from a side project to the world’s most-loved programming language
For decades, coders wrote critical systems in C and C++. Now they turn to Rust.
Design thinking was supposed to fix the world. Where did it go wrong?
An approach that promised to democratize design may have done the opposite.
Sam Altman invested $180 million into a company trying to delay death
Can anti-aging breakthroughs add 10 healthy years to the human life span? The CEO of OpenAI is paying to find out.
Stay connected
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more.