Jump to content

Build Theme!
  •  
  • Infected?

WE'RE SURE THAT YOU'LL LOVE US!

Hey there! :wub: Looks like you're enjoying the discussion, but you're not signed up for an account. When you create an account, we remember exactly what you've read, so you always come right back where you left off. You also get notifications, here and via email, whenever new posts are made. You can like posts to share the love. :D Join 93116 other members! Anybody can ask, anybody can answer. Consistently helpful members may be invited to become staff. Here's how it works. Virus cleanup? Start here -> Malware Removal Forum.

Try What the Tech -- It's free!


Photo

The 2007 Pandemic of the botnets


  • This topic is locked This topic is locked
15 replies to this topic

#1 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 23 February 2007 - 04:47 AM

FYI...

- http://news.bbc.co.u...ess/6298641.stm
25 January 2007 ~ "Criminals controlling millions of personal computers are threatening the internet's future, experts have warned. Up to a quarter of computers on the net may be used by cyber criminals in so-called botnets, said Vint Cerf, one of the fathers of the internet... Mr Cerf, who is one of the co-developers of the TCP/IP standard that underlies all internet traffic and now works for Google, likened the spread of botnets to a "pandemic"*. Of the 600 million computers currently on the internet, between 100 and 150 million were already part of these botnets, Mr Cerf said... "Despite all that, the net is still working, which is amazing. It's pretty resilient," said Mr Cerf... Whatever the solution, the fight against botnets was a "war" that could only be won if all parties - regulators, governments, telecoms firms, computer users and hardware and software makers - worked together."

- http://en.wikipedia.org/wiki/Botnet
"...Botnets have become a significant part of the Internet, albeit increasingly hidden. Due to most conventional IRC networks taking measures and blocking access to previously-hosted botnets, controllers must now find their own servers. Often, a botnet will include a variety of connections, ranging from dial-up, ADSL and cable, and a variety of network types, including educational, corporate, government and even military networks. Sometimes, a controller will hide an IRC server installation on an educational or corporate site, where high-speed connections can support a large number of other bots. Exploitation of this method of using a bot to host other bots has proliferated only recently..."

* http://www.thefreedi...ry.com/Pandemic
"...Epidemic over a wide geographic area and affecting a large proportion of the population.."

>>> http://www.shadowser...n=Stats.Botnets

:ph34r: :ph34r: :ph34r:

Edited by AplusWebMaster, 23 February 2007 - 07:03 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove


#2 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 23 March 2007 - 05:18 PM

FYI...

- http://isc.sans.org/...ml?storyid=2495
Last Updated: 2007-03-23 21:28:02 UTC ~ "According to data by Shadowserver*, the number of botnet-controlled machines has tripled in the last month. Specifically the jump seemed to start on March 8th or so and has kept going ever since. For the most part, they haven't tracked a significant increase in the number of botnets (only about a 20% jump), just the number of machines. The biggest C&C nets are near New York, Southern California, and near Germany. The biggest concentrations of botnet infected machines are in China, Brazil, and Argentina. So it appears botnet controllers are getting better at increasing the size of their herds."

* http://www.shadowser...BotCounts#month

- http://www.securityfocus.com/brief/466
2007-03-22 ~ "...The weekly tally of bot-infected PCs tracked by the group rose to nearly 1.2 million this week, up from less than 400,000 infected machines two weeks ago. The surge reversed a sudden drop in infected systems--from 500,000 to less than 400,000--last December..."

:ph34r:

Edited by AplusWebMaster, 25 March 2007 - 07:44 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#3 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 12 April 2007 - 04:52 AM

FYI...

(McAfee Threat Center - 2nd issue of McAfee Avert Labs security journal- Sage)
- http://www.mcafee.co...ter/default.asp
Apr 2007 ~ "...Botnets: Cybercrime Central - The largest enabler of cybercrime today is the botnet, a network of robot-infected PCs centrally controlled by an attacker, or bot herder. Bots gained their current status as a result of several factors. Perhaps the most important is that bots leverage the work of others. Several bot families are considered open source projects, developed collaboratively and refined by many. But even more important, bot developers piggyback on the work done by well-intentioned security researchers... When such vulnerabilities are made public in an effort to raise awareness, bot authors incorporate the work into new versions of their threats. If the payout for a crime exceeds the risks involved and the effort required, attackers will flock to it..."

(Monthly Botnet size currently at 2.4 million)
- http://www.shadowser...BotCounts#month

.

Edited by AplusWebMaster, 14 April 2007 - 04:45 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#4 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 15 May 2007 - 02:39 PM

FYI...

- http://www.pcworld.c.../printable.html
May 15, 2007 ~ "A tech trade group and a leading cybersecurity vendor applauded new legislation introduced in the U.S. Congress that would broaden penalties for cybercrime, including first-time penalties for botnet attacks. The Cyber Security Enhancement Act, introduced Monday, would create for the first time criminal penalties for botnet attacks often used to aid identity theft, denial-of-service attacks and the spread of spam and spyware... The bill would also broaden the definition of electronic data theft related to interstate or foreign communication, and expand the cyber extortion statute."


.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#5 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 19 May 2007 - 03:52 AM

FYI...

Online Criminal Gangs Battle With Botnets
- http://www.informati...cleID=199601992
May 18, 2007 ~ "Criminal cyber gangs are trying to steal zombie computers from rival botnets so they can boost their own numbers and raise the price they get from spammers.
Two or three online criminal gangs are waging an all-out battle for control of the largest botnets, sending out waves of malware aimed at stealing zombie computers from rival gangs to build up their own army. Each online gang is trying to build up the biggest botnet because the bigger the army of infected computers they control, the more money spammers and hackers will pay to use them, explains Shane Coursen, a senior technical consultant for Kaspersky Lab. Since the gangs have their own botnets already built up, they're all trying to pilfer victimized computers from their rivals, to diminish their competitor's botnets while they build up their own... the author of the well-known Storm Worm, also known as Zhelatin, is going head to head with the author or authors of the Warezov and Bagle worms. It's unclear whether one group is responsible for both the Warezov worm and the Bagle worm or if different groups are behind each one... "Instead of just one group that was kind of active, now we're looking at two definite groups and possibly three groups. The activities have increased very significantly over the last six months. We see a huge increase in the amount of spam, and it's largely because of this war"."


:huh: :wtf:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#6 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 12 June 2007 - 06:46 PM

FYI...

February 2007 Root Server Attacks...
- http://preview.tinyurl.com/3dxn74
June 9, 2007 ~ Arbor Networks - "...Nice summary of what actually occurred during the February 6/7, 2007 DNS attacks... actual targets of this attack were:
* F-Root, G-Root, L-Root and M-Root
* A9.INFO.AFILIAS-NST.info
* B9.INFO.AFILIAS-NST.ORG
* C9.INFO-AFILIAS-NST.info
* And another set most folks haven’t heard of, ns[2-5].opihhkj.com
* and pehaps ns1.opihhkj.com, but not certain
He went on to cite more mis-information provided by the media and emphasized how difficult it was to find an accurate story... Some of the unique information that John shared about the attacks included details on the botnet involved (these were the numbers and distribution of the bots themselves, firepower from each varied):
* ~4500-5000 bots on Microsoft Windows Boxes
* ~65% from South Korea
* ~19% from United States
* ~3.5% from Canada
* ~2.5% from China
* The rest from various places
The botnet controller was HTTP-based, physically located in Dallas, TX, USA, and was located by the bots via DNS, with a backup DNS name as well. The botnet itself was associated with a Russian-affiliated reseller and has continued to be used for DDoS attacks up until 2007-05-23.
The attacks consisted of:
* bots performed one DNS query per victim
* bots setup three “threads” per victim
* unique but stable source port per thread
* each thread employed it’s own 1023-octet payload “seed”
* UDP packets were then flooded to each victim on port 53
* source address was NOT spoofed
* each UDP packet of random 0-1023 seed payload
* each thread was set to last 24 hours
As for mitigation, because non-spoofed some source-based mitigation/filtering could be employed but difficult... many of the other targets hit by the botnet were of “Russian origin”..."

:blink:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#7 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 13 June 2007 - 09:13 PM

FYI...

Operation Bot Roast
- http://www.fbi.gov/p...otnet061307.htm
6.13.2007 ~ "...Operation Bot Roast was launched because the national security implications of the growing botnet threat are broad. The hackers may use the computers themselves, or they may rent out their botnets to the highest bidder. The more computers they control, the more they can charge their clients. A bot-herder can do a lot with compromised computers:
* Steal the computer owner’s identity;
* Launch massive spam campaigns;
* Engage in click-fraud—schemes which artificially inflate the number of visitors to a website; and
* Launch denial of service attacks that can cripple web servers and crash sites.
One of the difficulties in fighting this type of cyber crime is that it is difficult for computer owners to know if their machines have been infected. There is no easy way to tell, unfortunately. It may be running slowly, your outbox may be full of mail you didn’t send, and you may get mail stating you’ve sent spam. 'The majority of the victims are not even aware that their computers have been compromised or their personal information exploited,' said FBI Assistant Director James Finch, who heads our Cyber Division.
That’s why we urge every computer owner to implement the security precautions that are available. Prevention is always better than reaction."

(More detail at the URL above.)

.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#8 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 14 June 2007 - 06:17 AM

FYI...

FBI finds a million botnet victims
- http://www.theinquir...x?article=40321
14 June 2007 ~ "THE US Department of Justice and the FBI said that they have found more than a million botnet crime victims during "Operation Bot Net"*. A team, which included members of the Computer Emergency Response Team Coordination Center at Carnegie Mellon University and Microsoft, aimed to notify as many of the victims as possible. The FBI hoped that through this process it might uncover additional incidents in which botnets have been used to facilitate other criminal activity..."
* http://www.fbi.gov/p...otnet061307.htm

Shadowserver - 13.06.2007: New Graph: Total Malware Count
- http://www.shadowser...s.Malware#count

- http://www.us-cert.g...ges_bot_herders
June 14, 2007

:ph34r:

Edited by AplusWebMaster, 14 June 2007 - 07:40 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#9 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 16 September 2007 - 10:30 AM

FYI...

BotHunter Malware Analysis Automatic Summary Analysis Table
> http://www.cyber-ta....nalysis/public/
(This is a government funded research project so there is no charge for the public distribution.)


.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#10 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 18 September 2007 - 01:15 PM

FYI...

Arbor Networks annual security survey
- http://www.theregist..._botnet_survey/
18 September 2007 - "Arbor Networks' third annual worldwide infrastructure security report* found that, for the first time, botnets surpassed distributed denial of service attacks as the top operational threat identified by service providers. Botnet networks of compromised PCs act as resources to distribute spam, launch denial of service attacks or get up to other forms of mischief. Distributed denial of service (DDoS) attacks represent a major problem, with attack trends changing. While mid-level DDoS attacks have plagued the internet since 2000, survey respondents report a widening gap between common mid-level "amateur" attacks and multi-gigabit "professional" efforts involving tens of thousands of zombie hosts. Most surveyed ISPs reported significant improvements in the sophistication and coordination of DDoS attacks. Surveyed ISPs reported sustained attack rates exceeding 24 Gbps. Most individual core internet backbone links today are no larger than 10 Gbps, which means most of the larger attacks inflict collateral damage on net infrastructures way upstream from the targets of attacks, Arbor notes..."

* http://www.arbornetworks.com/report
"Worldwide Infrastructure Security Report Highlights:
* Bots overtake DDoS as chief security concern - Respondents believed bots and botnets to be a larger threat than DDoS attacks.
* DDoS attacks going pro - Survey respondents report a widening gap between common mid-level “amateur” attacks and multi-gigabit “professional” efforts.
* Attacks outpace ISP network growth - Surveyed ISPs reported sustained attack rates exceeding 24 Gbps – more than double the size of these recently upgraded links.
* VoIP is vulnerable - Only 20 percent of ISPs surveyed currently have specific tools or mechanisms to monitor and detect threats against VoIP.
* Rise of managed security services - There is a significant increase in the number of service providers offering managed DDoS detection and mitigation services..."

.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove


#11 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 21 September 2007 - 05:45 AM

FYI...

Hackers control PCs while users unaware
- http://www.reuters.c...0070921?sp=true
Sep 21, 2007 - "...More important than security software, users need to monitor their own behavior. The bulk of malware is installed on computers by users who either click on a Web link or on a file that is attached to an email or instant message. PC users can greatly reduce the risk of infection by only visiting familiar Web sites and avoiding unknown attachments..."


:huh:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#12 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 29 November 2007 - 06:48 AM

FYI...

FBI: Operation 'Bot Roast II' nets hackers
- http://www.fbi.gov/p...roast112907.htm
November 29, 2007 - "The FBI today announced the results of the second phase of its continuing investigation into a growing and serious problem involving criminal use of botnets. Since Operation 'Bot Roast' was announced last June, eight individuals have been indicted, pled guilty, or been sentenced for crimes related to botnet activity. Additionally, 13 search warrants were served in the U.S. and by overseas law enforcement partners in connection with this operation. This ongoing investigative effort has thus far uncovered more than $20 million in economic loss and more than one million victim computers. FBI Director Robert S. Mueller, III said, "Today, botnets are the weapon of choice of cyber criminals. They seek to conceal their criminal activities by using third party computers as vehicles for their crimes. In Bot Roast II, we see the diverse and complex nature of crimes that are being committed through the use of botnets. Despite this enormous challenge, we will continue to be aggressive in finding those responsible for attempting to exploit unknowing Internet users"..."
- http://abcnews.go.com/print?id=3927818

:ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#13 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 07 December 2007 - 06:44 AM

FYI...

- http://www.darkreadi...o...&print=true
DECEMBER 6, 2007 - "The average life span of a command and control server in an Internet Relay Chat (IRC)-based botnet is less than two months. And these machines and their drones that make up a botnet are typically scattered around the world, a new study* on IRC botnets reveals. German and Chinese researchers from Peking University in Beijing and from the University of Mannheim in Germany teamed up to track and study traditional IRC-based botnets over the last year. They found and followed 3,290 IRC-based botnets in the wild, using a honeynet of 17 nodes in 16 provinces in China and some automated tools... The researchers found more proof of what bot hunters have been saying all along: that IRC is becoming less and less the mode of communication for botnet operators as they attempt to evade detection and stay alive. "Botnets seem to shift away from IRC to protocols like HTTP, Peer-to-Peer-based protocols, or custom protocols," the report says. Still, the researchers consider the relatively short life expectancy of the C&C servers a sign of how flexible these traditional botnet infrastructures are..."
* http://honeyblog.org...et-china-TR.pdf

:ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#14 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 31 December 2007 - 05:40 PM

FYI...

SRI Honeynet and BotHunter Malware Analysis
- http://www.cyber-ta....nalysis/public/
last updated: Mon Dec 31 2007 - "The malware infections displayed in our daily infection log summaries were harvested live from the SRI high-interaction honeynet. The daily infection logs (right) present each day's infection summary, and are 100% autogenerated and posted each morning (PT)..."

:wall: :ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#15 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 22 February 2008 - 09:40 AM

FYI...

Canadian botnet busted
- http://www.sophos.co...net-busted.html
21 February 2008 - "...In a co-ordinated series of dawn raids, the Sûreté du Québec and Royal Canadian Mounted Police, arrested people in 12 different towns, ranging in age from 17 to 26 years old. One of those arrested is a nineteen year old woman. The gang is believed to have run a zombie network (also known as a botnet) of up to one million computers, spanning 100 countries around the globe. Seven people were charged charged with illegally obtaining computer services, illegally possessing computer passwords, and hacking. Police confiscated computer equipment during the raids, and information found on the PCs may lead to more charges against other alleged gang members. If found guilty, gang members could face up to 10 years behind bars, head of the computer crime squad Captain Frédérick Gaudreau told the media, adding that hundreds of officers were involved in the investigation into the gang after complaints were made in the summer of 2006 from business and government computer users..."

:thumbup:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

Related Topics



1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users