Telstra to supress malware on BigPond

Telco says new network technology won't monitor Internet traffic or search history

Telstra will add DNS-based malware suppression to the BigPond network this October, becoming the first ISP in Australia to deploy the technology, the telco has announced.

The technology, which is already used in North America and Europe, is a network feature that prevents computers and devices infected with botnet malware to communicate with their command-and-control servers.

Computers send DNS requests whenever a user connects to a website. BigPond’s new suppression feature will flag DNS requests to known command-and-control servers as unusual and stop the connection before it can be made, Telstra revealed in a blog post today.

Telstra said the network tool would not collect any personal information, including which websites BigPond customers are visiting.

“Because the malware suppression technology only observes DNS queries and not internet traffic, no internet search history, browsing data or any other customer data is recorded, retained or sent to a third party,” Telstra said.

Telstra previously received controversy for a network management trial in Victoria that uses peer-to-peer throttling in an attempt to reign in congestion. Consumer advocacy group, the Australian Communications Consumer Action Network (ACCAN), had voiced privacy concerns that the network technology involved could result in “intrusive monitoring” of consumers.

Follow Adam Bender on Twitter: @WatchAdam

Follow Computerworld Australia on Twitter: @ComputerworldAU, or take part in the Computerworld conversation on LinkedIn: Computerworld Australia

Tags botnetssecurityNetwork managementbigpondTelstraprivacymalware

More about Telstra Corporation

6 Comments

Nobby6

1

This is good news, Telstra might be the first public ISP to publicly tout doing it, but they are far from the first network in the country to do it, we've been doing it for a couple of years (with great success) so I applaud Telstra for this, and hope TPG, Optus and iiNet follow, it is no light on there is no excuse for even the smallest ISP, to not be doing it.

Solomons' Sword

2

Can we add the Greens and Palmer Party websites to the DNS blocking? Who determines the block list? Same government public servants that were redundant because the Conroy Great Internet Filter was not rolled out and the technology is there waiting, unused. Wrong solution - better to eliminate the websites rather than isolate them. This requires international co-operation, or should we have crowd sourcing to operate an international vigilante operation to eliminate (physically) these unwanted scum from the face of the earth?

Hugh Jaas

3

Glad I use my own DNS server, so I don't have Bigpond interferring with my ability to resolve hosts.

unimpressed

5

Sounds a bit like an internet flter and affecting net neutrality.
If they administer the scheme and formulate blocklist where is the assurance they don't censor something else under the guise of malware. (Especially if they accept people reporting such sites)
And if you own the site they blocked by mistake they might take a while to unblock it as you lose revenue
Or if it was infected but you cleaned the site and remediated the root cause (say unreliable Dns provider or unpatched server + cleanup ofchanges malicious changes) how long would it take them to take it off the list

This isn't the best idea

unimpressed 2

6

At least you can use Google dns or another server

Comments are now closed

Microsoft at a loss over Event Viewer scam

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]