A new “Trojan horse” program called Phatbot is spreading across Windows computers connected to the Internet, employing a range of nefarious tactics including some borrowed from the world of peer-to-peer file sharing systems such as Kazaa and the original Napster. According to the Washington Post, which broke the story on March 17, Phatbot can create invisible networks of up to 50 infected machines. This gives the hackers who wrote the program a highly efficient way to issue orders to the machines, in essence recruiting them into an underground hacker army. For example, the networks could be used to launch massive spam or denial-of-service attacks.
The resilient nature of peer-to-peer networks – if one node is removed, communications will simply flow around it – means that security officials will have a very hard time slowing Phatbot’s spread, short of tracking down every single infected machine. Just as alarming, the malicious program can evade and shut down many popular anti-virus programs. But the Post links to several sites where anti-Phatbot programs can be downloaded.
It will soon be easy for self-driving cars to hide in plain sight. We shouldn’t let them.
If they ever hit our roads for real, other drivers need to know exactly what they are.
Maximize business value with data-driven strategies
Every organization is now collecting data, but few are truly data driven. Here are five ways data can transform your business.
Cryptocurrency fuels new business opportunities
As adoption of digital assets accelerates, companies are investing in innovative products and services.
Where to get abortion pills and how to use them
New US restrictions could turn abortion into do-it-yourself medicine, but there might be legal risks.
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more.