On Fri, Jun 10, 2005 at 08:59:21AM +0200, Kristian K?hntopp wrote:
On Wednesday 08 June 2005 21:51, tor wrote:
Of particular interest is the increasing
sophistication of automated worm-based attacks. He cites the
developing W32.spybot.KEG
worm -- once inside a network it scans for several
vulnerabilities and reports its findings via IRC.
And Sober variants routinely use JAP to fetch updates.
There no reason for a worm to not use a P2P onion network for control
traffic, and unblockable software updates. Sooner or later it's bound to
happen.
A Tor worm in China would actually be a good thing.