Yes, the whole concept of researchers hijacking malware is fascinating, especially since they did it by registering unregistered domains, and then spoofing as a C & C servers.  It's a precarious ethical quandry.

The Torpig is a Windows botnet. 
http://www.sophos.com/security/analyses/viruses-and-spyware/trojtorpiga.html

Linux (and Mac) however are also adversely affected by botnets:

http://lwn.net/Articles/222153/

On Tue, May 5, 2009 at 7:38 AM, Stephen P Rufle <stephen.p.rufle@cox.net> wrote:
http://www.pcpro.co.uk/news/252353/hijacked-botnet-exposes-startling-online-habits.html

Thought it was interesting in regards to security. I did not read the
pdf linked in the article, but it would be interesting to know what the
breakdown by OS is :). Or does it even matter if most info is actually
gotten through website exploits of some type.
---------------------------------------------------
PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss



--
www.obnosis.com (503)754-4452
"Contradictions do not exist." A. Rand