Home
 » ISP News » 
Sponsored

IET Calls on UK ISPs to Restrict Internet Access of Virus Infected Computers

Tuesday, June 17th, 2014 (2:17 pm) - Score 565

The Institution of Engineering and Technology (IEF) has called on broadband ISPs in the United Kingdom to help tackle malware (malicious software and viruses) by, for example, restricting Internet access to infected computers and devices (e.g. PCs, Tablets etc.).

According to the IET’s resident security expert, Hugh Boyes, a more “joined-up approach” of law enforcement working with the ISPs to reduce the number of infected computers would benefit everyone. But should we really go so far as to restrict a customer’s Internet access, especially without first considering what their circumstances might be? The IET thinks so.

Hugh Boyes told ISPreview.co.uk:

Based on the latest statements from the National Crime Agency it would appear that their campaign to encourage computer users to scan for and remove GoZeus and CryptoLocker infections has been only partially successful.

The IET believes that more could be done to tackle existing infections. Internet Service Providers (ISPs), for example, could restrict internet access to infected machines or Internet Protocol addresses by redirecting users to a page with information on infection removal. They could also provide telephone technical support to customers to help them to remove the malware.”

Perhaps the campaign to encourage computer users to scan for and remove GoZeus and CryptoLocker was only “partially successful” (we’ll have to see what happens after the imminent deadline first) because the threat posed to the wider public was massively over-hyped by the media and those reports rarely included mention of how to identify and tackle the threat (installing the free Malwarebytes is one option).

Indeed according to the National Crime Agency, GOZeus alone is allegedly installed on over 15,500 computers across the UK, which in the grander scheme of things isn’t even a blip on the national scale of malware infections. Meanwhile when security reports surfaced earlier this year that hundreds of thousands of home broadband routers had suffered a DNS hijack very few in the mainstream media reported it. Funny old world.

Otherwise Boyes comments appear to mirror what the vice president of online security firm Trend Micro, Rik Ferguson, said earlier this month (here). But should ISPs be restricting Internet access to help customers who clearly aren’t able to do it themselves? Admittedly we like the idea of ISPs being more pro-active in this area and indeed some will already work to identify abuse activity on their networks and inform their customers.

However there are also some big risks, not least with the fact that many connections are now shared between multiple devices and users (e.g. office or family home). As a result it would be tricky to identify precisely which computer/device is infected and incredibly difficult to isolate that without affecting the service for everybody else, which could have all sorts of unintended consequences, or raising serious questions over the potential for an invasion of privacy and conflicts with other laws or freedoms.

Restrictions might also make it harder for the end-user to find a solution, especially if they have a clean system/device nearby. On the other hand a nag screen that calls on the customer to check their computer and provides useful data on the identified infection might not be a bad idea, although ISPs could perhaps do this for some but not all malware (some attack traffic leaves an obvious trace but others are more covert) and it would require money to develop.

Ultimately issues like this are matter of individual customer responsibility and the best defence is to ensure that all of your key software, anti-virus clients, firewalls and web browsers are kept up-to-date. A bit of common sense when using the Internet can also go a long way, such as never clicking an email attachment or link unless you’re 100% sure it’s legitimate (phishing attacks try to look like the real-deal).

Share with Twitter
Share with Linkedin
Share with Facebook
Share with Reddit
Share with Pinterest
By Mark Jackson
Mark is a professional technology writer, IT consultant and computer engineer from Dorset (England), he also founded ISPreview in 1999 and enjoys analysing the latest telecoms and broadband developments. Find me on Twitter, , Facebook and Linkedin.
Leave a Comment
2 Responses
  1. DanielM says:

    F-Secure + Malwarebytes FTW

    Both helped me remove the evil Ramnit.A + 2 Backdoors

  2. hmmm says:

    If you must use windows use a Sandboxie

    Run programs in a sandbox to prevent rogue software, unwanted programs, spyware, viruses, worms, and other malware from making permanent changes to your machine
    Protect yourself or your company from a wide variety of attacks – ranging from botnets to banking Trojans and ransomware to run of the mill viruses
    Configure your own sandboxes to meet your specific needs
    Trial the Sandboxie Free version, buy the Sandboxie Pro version or upgrade to an enterprise grade product with Invincea FreeSpace™ to take advantage of invisible protection, central management, behavioral based malware detection & reporting, malware forensics capture, threat intelligence feeds
    better still use linux

Comments are closed.

Comments RSS Feed

Javascript must be enabled to post (most browsers do this automatically)

Privacy Notice: Please note that news comments are anonymous, which means that we do NOT require you to enter any real personal details to post a message. By clicking to submit a post you agree to storing your comment content, display name, IP, email and / or website details in our database, for as long as the post remains live.

Only the submitted name and comment will be displayed in public, while the rest will be kept private (we will never share this outside of ISPreview, regardless of whether the data is real or fake). This comment system uses submitted IP, email and website address data to spot abuse and spammers. All data is transferred via an encrypted (https secure) session.

NOTE 1: Sometimes your comment might not appear immediately due to site cache (this is cleared every few hours) or it may be caught by automated moderation / anti-spam.

NOTE 2: Comments that break our rules, spam, troll or post via known fake IP/proxy servers may be blocked or removed.
Cheapest Superfast ISPs
  • Hyperoptic £15.00 (*25.00)
    Speed 50Mbps, Unlimited
    Gift: None
  • Vodafone £19.50 (*22.50)
    Speed 35Mbps, Unlimited
    Gift: None
  • NOW £20.00 (*32.00)
    Speed 36Mbps, Unlimited
    Gift: None
  • Shell Energy £21.99 (*30.99)
    Speed 35Mbps, Unlimited
    Gift: None
  • Plusnet £22.99 (*38.20)
    Speed 36Mbps, Unlimited
    Gift: £65 Reward Card
Large Availability | View All
Cheapest Ultrafast ISPs
  • Hyperoptic £20.00 (*35.00)
    Speed: 150Mbps, Unlimited
    Gift: None
  • Vodafone £24.00 (*27.00)
    Speed: 100Mbps, Unlimited
    Gift: None
  • Community Fibre £25.00 (*29.50)
    Speed: 300Mbps, Unlimited
    Gift: None
  • Gigaclear £26.00 (*54.00)
    Speed: 400Mbps, Unlimited
    Gift: None
  • Virgin Media £27.00 (*51.00)
    Speed: 108Mbps, Unlimited
    Gift: None
Large Availability | View All
The Top 20 Category Tags
  1. FTTP (3497)
  2. BT (3008)
  3. Politics (1923)
  4. Building Digital UK (1917)
  5. FTTC (1882)
  6. Openreach (1820)
  7. Business (1674)
  8. Mobile Broadband (1468)
  9. Statistics (1405)
  10. FTTH (1364)
  11. 4G (1270)
  12. Fibre Optic (1164)
  13. Virgin Media (1159)
  14. Wireless Internet (1151)
  15. Ofcom Regulation (1139)
  16. Vodafone (836)
  17. EE (829)
  18. TalkTalk (760)
  19. 5G (760)
  20. Sky Broadband (744)
Promotion
Helpful ISP Guides and Tips
»
»
»
»
»
»
»
»
»
»
»
»
»
»
»
»
»
»
»
»
»
»
»
»
»
»
»
»
Sponsored

Copyright © 1999 to Present - ISPreview.co.uk - All Rights Reserved - Terms , Privacy and Cookie Policy , Links , Website Rules , Contact