Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security

Botnet Expert Wants 'Special Ops' Security Teams 115

CWmike writes "Criminal cybergangs must be harried, hounded and hunted until they're driven out of business, a noted botnet researcher said as he prepared to pitch a new anti-malware strategy at the RSA Conference in SF. 'We need a new approach to fighting cybercrime,' said Joe Stewart, director of SecureWorks' counterthreat unit. 'What we're doing now is not making a significant dent.' He said teams of paid security researchers should set up like a police department's major crimes unit or a military special operations team, perhaps infiltrating the botnet group and employing a spectrum of disruptive tactics. Stewart cited last November's takedown of McColo as one success story. Another is the Conficker Working Group. 'Criminals are operating with the same risk-effort-reward model of legitimate businesses,' said Stewart. 'If we really want to dissuade them, we have to attack all three of those. Only then can we disrupt their business.'"
This discussion has been archived. No new comments can be posted.

Botnet Expert Wants 'Special Ops' Security Teams

Comments Filter:
  • by the4thdimension ( 1151939 ) on Wednesday April 22, 2009 @08:05AM (#27673193) Homepage
    Teach users to be safe on the internet and not download any old thing that pops up on the screen... seems cheaper and easier than waging an all out witch hunt on botnet admins.
  • by emocomputerjock ( 1099941 ) on Wednesday April 22, 2009 @08:16AM (#27673271)
    This still doesn't address drive by exploits, XSS, SQL injections, or any number of other threats. That being said, vigilantism isn't the approach either. You have to get countries and governments on board, with treaties signed and all that jazz.
  • by T5 ( 308759 ) on Wednesday April 22, 2009 @08:20AM (#27673289)

    I'd call that a abject failure, a speed bump at best. It was a temporary takedown that was reinstated long enough for the baddies to copy all of their goods off to another site and reset the command and control to point to that other site.

  • How about... (Score:0, Insightful)

    by Anonymous Coward on Wednesday April 22, 2009 @08:24AM (#27673321)

    How about building secure systems?

    Swat one fly, ten arrive to feed.
    Swat ten flies, a hundred arrive instead.
    Remove the food, and no flies arrive.

  • Well (Score:5, Insightful)

    by I)_MaLaClYpSe_(I ( 447961 ) on Wednesday April 22, 2009 @08:26AM (#27673331)

    If user education was going to work, it would have worked by now.

    ~ Anti-virus researcher Vesselin Bontchev

  • by pzs ( 857406 ) on Wednesday April 22, 2009 @08:35AM (#27673399)

    Any solution that relies on people not being lazy morons is never going to work.

  • by AHuxley ( 892839 ) on Wednesday April 22, 2009 @08:39AM (#27673431) Journal
    When the researchers came for the malware authors,
    I remained silent;
    I was not a malware author.
    Then they locked down the adult sites,
    I remained silent;
    I was not a pervert.
    Then they came for the bittorrent trackers,
    I did not speak out;
    I was not a pirate.
    Then they came for the internet,
    I did not speak out;
    I was not a blogger.
    When they came for me,
    there was no where left to speak out.
  • Re:ISPs (Score:3, Insightful)

    by hesaigo999ca ( 786966 ) on Wednesday April 22, 2009 @08:43AM (#27673469) Homepage Journal

    Not if they charge per email sent... like .0001 cent...still adds up enough to let someone know they are infected, and with a cap at 100$ month, this will avoid a user falling off his chair, but make it sure evident to do something about it before next month.

    As for the culprits, 100$ per month for spamming, might not be much, but then you have a paper trail of which could be used to track activity for perticular botnets.

  • Re:ISPs (Score:5, Insightful)

    by JerkBoB ( 7130 ) on Wednesday April 22, 2009 @08:49AM (#27673537)

    If they start doing that, then botnet writers will have an incentive to have their rootkits start deleting emails (when a common email program loads up). I don't think they'll be that choosy about what they delete either.

    Sending warning emails to users is a pointless exercise. Assuming that they read/understand the email in the first place (BIG assumption), I guarantee that the majority of them will just delete it. Why should they care if their computer's a zombie? It still works well enough to do whatever it is they're online to do.

    No, I think the solution is for zombied computers to be quarantined. Use DNS and routing tricks to redirect any attempts to go anywhere "on the internets" (i.e. a web browser) to a site which explains that they're quarantined, and what they have to do to get out.

    Unfortunately, that would raise call volumes to the ISP support lines, and require commitment on the ISPs' part to train their support monkeys. If ISPs started facing financial penalties for zombied users, then maybe the economics would balance out.

    I'm sure I'm not the first person to think of this, though, so I'm probably missing something.

  • by mrboyd ( 1211932 ) on Wednesday April 22, 2009 @09:03AM (#27673655)
    Why calling it a witch hunt? Police force and army should gear up and have some kind of internet swat team as more and more crimes are committed online. I don't see why sometime a team of "security researcher", white hat or iSwat (however you want to call them) working under a police mandate couldn't be allowed to "raid" a computer, place rootkits, keyloggers and whatnot if they have the proper warrant. Just like they could bug your phone or search your house, car, financial records with again the proper warrant. Just because it's the internet doesn't mean it has to be out of the scope of law enforcement.
  • by Anonymusing ( 1450747 ) on Wednesday April 22, 2009 @09:12AM (#27673763)

    There is no crime if nobody got hurt in the real life. There is (or should not be) any such thing as cyber-murder, cyber-theft, cyber-kidnapping etc, simply because everything that's "cyber" is "information", and information, by definition cannot be murdered, stolen or kidnapped.

    Are you serious?

    This isn't about virtual murder. It's about botnets that may steal your credit card information, be directed to launch attacks against servers, etc. There is significant potential for financial harm. Suppose your credit lines were maxed out by someone else, rendering your payments late, and then your bank got DoS'd so you couldn't access your money? What if you lived in Estonia, whose governmentand banks were essentially shut down during a massive cyberattack?

  • by tacokill ( 531275 ) on Wednesday April 22, 2009 @09:21AM (#27673853)
    There are several posts advocating larger ISP involvement and nobody has mentioned the obvious slippery slope with ISP's being put into a "policing" role.

    If ISPs are allowed to "track down" botnets and botnet zombies, then why can't they "track down" torrents? Or porn? or any other thing that the powers-that-be don't want you downloading? Am I the only one who sees major problems with ISP's being put in a watchdog role?

    I can't believe nobody has brought this up. Am I in the right place? Is this slashdot?
  • by mapkinase ( 958129 ) on Wednesday April 22, 2009 @10:32AM (#27674543) Homepage Journal

    That's sounds like a case of one of the Godwin law extensions

  • Re:ISPs (Score:3, Insightful)

    by dnaumov ( 453672 ) on Wednesday April 22, 2009 @10:35AM (#27674587)

    I work for a major finnish ISP and since this information is public knowledge, I am not going to anon this post.

    We have several systems (which are actually pretty good and do work) in place that identify and warn us regarding the kind of traffic that happens when a customer machine is turned into a botnet zombie. When this is deteched, the customer is approached by either email or phone and given a grace period of a couple of days to clean up his machine. If the customer ignores this, his internet connection gets locked when the grace period is up.

    If we cannot contact the customer by email/phone, we simply lock the connection, eventually the customer will call us.

    Quite obviously we also block any outgoing :25 STMP traffic to any and all servers except our own.

  • Re:ISPs (Score:3, Insightful)

    by JerkBoB ( 7130 ) on Wednesday April 22, 2009 @10:49AM (#27674737)

    I don't mean this in a snarky way, but given that the population of the entire country of Finland is ~5.2M folks, I can't imagine that even a "major" Finnish ISP has a huge userbase.

    I used to work for a medium-sized regional ISP. We were one of several similar-sized ISPs serving a multi-metro area of maybe 3M people. At our peak, we had 30k accounts, if I recall correctly. This was back in the dialup days, btw.

    Anyhow, my point is that when you're talking about the scale of the behemoth ISPs here in the States, expecting proactive approaches to zombie fighting is unrealistic. Support is an expensive cost center, which is why it's been farmed off to India. Getting experienced people who know how to do more than reboot the computer or reinstall ethernet/modem drivers is pretty experienced.

    It's the financial aspects of the problem which make me pessimistic that ISPs will do anything to fix it.

  • by emocomputerjock ( 1099941 ) on Wednesday April 22, 2009 @10:58AM (#27674817)
    I argue differently. SQL injections, XSS attacks, and drive-by exploits are every bit a part of the botnet problem. Firstly, malware needs a place to exist. This is not only on domains stood up with the express purpose of hosting said malware, but on legitimate compromised webservers. Secondly, malware and botnet coders are coming up with as many possible exploits that do not involve user interaction through javascript, browser exploits, and unpatched security vulnerabilities. For the remainder there are intensely sophisticated attacks relying on social engineering and reputation hijacking. It's a lot easier to run code on users machine when the webserver is one the user already trusts and has set in a trusted security zone. The solution to this problem is going to require multinational political agreement. The problem with that is not only is it work, but the countries the criminals reside in have little to no incentive to cooperate. These countries are often poor and have a base of computer science and programming majors with low-paying or no jobs who commit computer crime for the income. It may not be legal, but those people are at least making and spending money making it a heck of a lot more difficult to enlist the host countries help in apprehending them.

Kleeneness is next to Godelness.

Working...