Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: dangerdoc

Being relatively computer literate, I understand how viruses work, but would someone please tell me WHY??
WHY would people spend so much time and talent creating these things to destroy the property of people they don’t even know. Is there money in it? What’s the point of destroying the Internet THEY ARE USING by making it so dangerous? Can someone ‘splain it to me?


4 posted on 01/22/2009 3:02:34 PM PST by ClearBlueSky (Whenever someone says it's not about Islam-it's about Islam. Jesus loves you, Allah wants you dead!)
[ Post Reply | Private Reply | To 1 | View Replies ]


To: ClearBlueSky

Same reason a dog licks itself.


5 posted on 01/22/2009 3:04:16 PM PST by null and void (We are now in the third day of our national holiday from reality.)
[ Post Reply | Private Reply | To 4 | View Replies ]

To: ClearBlueSky
"Being relatively computer literate, I understand how viruses work, but would someone please tell me WHY?? WHY would people spend so much time and talent creating these things to destroy the property of people they don’t even know. Is there money in it? What’s the point of destroying the Internet THEY ARE USING by making it so dangerous? Can someone ‘splain it to me?"

The simple straight answer is, because they can. As stupid as that may sound, they actually get a feather in their cap and are considered "elite" among their peers for doing it. It's a rather hedonistic attitude, but it is what it is.

7 posted on 01/22/2009 3:06:26 PM PST by DaGman
[ Post Reply | Private Reply | To 4 | View Replies ]

To: ClearBlueSky

Once a trojan is in place on your computer, they can remotely access it and program it to do whatever they want. Send spam, launch an attack against other computers, search for anything on your computer that looks like a credit card number or userids and passwords, or watch for you to open particular web sites, like online banking sites, and record the keystrokes you enter when you log in and send them the information.


10 posted on 01/22/2009 3:09:13 PM PST by tacticalogic ("Oh bother!" said Pooh, as he chambered his last round.)
[ Post Reply | Private Reply | To 4 | View Replies ]

To: ClearBlueSky
Being relatively computer literate, I understand how viruses work, but would someone please tell me WHY?? WHY would people spend so much time and talent creating these things to destroy the property of people they don’t even know. Is there money in it? What’s the point of destroying the Internet THEY ARE USING by making it so dangerous? Can someone ‘splain it to me?
Look up the economics of malware. Trojans like this one can make *millions* for their creator, you can use them to steal credit cards, send spam(which is $$$$$$ believe it or not) etc...
11 posted on 01/22/2009 3:11:46 PM PST by ketsu (ItÂ’s not a campaign. ItÂ’s a taxpayer-funded farewell tour.)
[ Post Reply | Private Reply | To 4 | View Replies ]

To: ClearBlueSky
Can someone ‘splain it to me?

Money. The trojans are used for spam and DDOS extortion botnets. Something like this requires no talent though. Just slip a standard botnet script into the iWork installer.

Other cracks that take much more talent to pull off are usually done either for money or to improve the reputation of the cracker in the community, or both. The skilled hacker community looks down on simplistic trojans such as this. Only script kiddies (bored, relatively talentless, malicious kids -- the modern vandalism) and organized crime think this is cool.

12 posted on 01/22/2009 3:17:13 PM PST by antiRepublicrat ("I am a firm believer that there are not two sides to every issue..." -- Arianna Huffington)
[ Post Reply | Private Reply | To 4 | View Replies ]

To: ClearBlueSky
Keyloggers can identify which bank website you log into and record your name and SN, so some of it is profit motive. Also, I knew one guy who got a visit from the FBI. His computer was being used as a server for child porn web sites. FBI confirmed the guy didn't even know it was on his computer. Trojan infection, remote access, use the guy's computer for any illegal activity you wish, and you've left no footprints authorities can follow.

And, as Alfred put it in the Dark Knight, "Some men just want to see the world burn."

13 posted on 01/22/2009 3:19:38 PM PST by Richard Kimball (We're all criminals. They just haven't figured out what some of us have done yet.)
[ Post Reply | Private Reply | To 4 | View Replies ]

To: ClearBlueSky
Just to add a bit to tacticalogic's excellent reply my recent experience is that they also use compromised computers to engage in "referrer spam" which, while a problem for some time, seems to be getting worse.

In a nutshell some search engines look at the number of links to a site as one measure of popularity. Bot, or zombie machines will go around hitting sites with info that they were referred by a particular site and that site is shown in web and blog logs as a referrer and points back to that site. Bingo, that referring site gets a gold star from the search engine.

To a lesser degree some people sell "traffic". This traffic can cause a site to make money from ad impressions and improve their traffic ranking. Again zombie machines are commonly used for purchased traffic.

It's just a money making thing, they could care less about the Internet. Twenty years ago it would have been some other scam, now it's just easier since they can do it on a large scale for very little investment.

Think of spam. Who in their right mind would click on spam and actually give a strange site money? Very, very few people but spammers can send out a million emails for next to nothing and if they get just one hit they're ahead.

14 posted on 01/22/2009 3:19:38 PM PST by Proud_texan (Scare people enough and they'll do anything.)
[ Post Reply | Private Reply | To 4 | View Replies ]

To: ClearBlueSky

“Being relatively computer literate, I understand how viruses work, but would someone please tell me WHY??
WHY would people spend so much time and talent creating these things to destroy the property of people they don’t even know. Is there money in it? What’s the point of destroying the Internet THEY ARE USING by making it so dangerous? Can someone ‘splain it to me?”

DEMOCRATS LOL


15 posted on 01/22/2009 3:23:46 PM PST by blueyon (Every one will have their 15 mins under the bus)
[ Post Reply | Private Reply | To 4 | View Replies ]

To: ClearBlueSky

“Being relatively computer literate, I understand how viruses work, but would someone please tell me WHY??”

After they get your account number and password, they can loot your bank and brokerage accounts via wire transfers. If you don’t look at your account regularly and don’t get paper statements, the money could be gone before you notice it. A pickpocket can steal your wallet - these people can steal every dime you own in an online-accessible account.


19 posted on 01/22/2009 4:42:40 PM PST by Zhang Fei
[ Post Reply | Private Reply | To 4 | View Replies ]

To: ClearBlueSky

Other than the reasons already mentioned; some of these people (the really good ones) can actually make a legitimate living with their “Black Hat’ knowledge. Either by consulting with companies on security procedures, and/or writing things to test new detection algorithms, or reverse engineering and backtracing existing ones in the wild. That’s the “White Hat” side of the same coin.


20 posted on 01/22/2009 4:52:03 PM PST by AFreeBird
[ Post Reply | Private Reply | To 4 | View Replies ]

To: ClearBlueSky

Follow the money.


32 posted on 01/22/2009 7:34:43 PM PST by gost2
[ Post Reply | Private Reply | To 4 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson