How would the iCode target malware that activates only over public wifi? Can accurate figures be obtained on customer infections?
These are some of the questions that will be asked when telco and government security boffins meet to discuss the anti-botnet iCode tomorrow in Sydney.
Telcos that subscribe to the iCode monitor their networks for signs of malware activity on subscriber machines and then contact victims to help remove any infections.
The standing-room only event coincides with an 18 month review of the iCode by the Department of Broadband, Communications and the Digital Economy (DBCDE) and the Internet Industry Association (IIA).
The review would attempt to gauge the success of the scheme and whether changes were needed including the slim possibility of mandating that telcos adopt specific technologies and processes to comply with the otherwise relaxed and voluntary scheme.
Telcos and the Internet Industry Association which oversaw the iCode disliked the prospect of having prescribed technologies.
“We’re all different organisations,” Internode security manager Derek Groke said. “We’ve got different processes, people, infrastructure, some are publicly-listed and others not. All this makes a big difference.”
Yet statistics that show success or failure of the iCode do not exist because of the differences in the way telcos handled customer malware infections.
Instead, the iCode was considered a success because it was essentially an extension to small ISPs of long-established practises within large telcos to help keep machines clean – and customers happy.
Groke and his counterparts at Telstra, Optus and iiNet kept watch of infections like Flashback and DNSChanger that spiked across their subscribers and would issue removal instructions to frontline customer service staff.
“We have all been doing this for a long time,” Groke said. “It’s about good business practice and competitiveness, and about freeing up customer service staff.”
“At the end of the day, you do as much as you can, as often as you can.”
Discussions would also examine how the iCode would tackle emerging sophisticated malware and operate in an IPV6 environment.
Rob Forsyth, former IIA board member and local managing director of security firm Sophos had discussed ways malware writers could complicate customer disinfection efforts.
“Imagine malware that would only spew out spam when an infected device connects to a public hotspot at say Starbucks or the Qantas lounge - how would you help clean the device?” Forsyth said.
He had also discussed with fellow iCode members about how botnets may be tracked over large IPV6 address spaces, which he described as “different, but not more difficult”.
The discussions were the most advanced of the anti-botnet iCode deployments. In May, South Africa announced it would deploy the iCode while the US adopted the scheme in all but name.
Senior Indian Government officials had also flagged keen interest in the code while former iCode creator and IIA Peter Coroneos had pitched the scheme to European governments and telcos at the Messaging Anti-Abuse Working Group conference in Berlin last week.
Copyright © SC Magazine, Australia
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @itnews.com.au to your white-listed senders.