Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Botnet Security IT

Botnets Using Ubiquity For Security 95

Trailrunner7 sends in this excerpt from Threatpost: "As major botnet operators have moved from top-down C&C infrastructures, like those employed throughout the 1990s and most of the last decade, to more flexible peer-to-peer designs, they also have found it much easier to keep their networks up and running once they're discovered. When an attacker at just one, or at most two, C&C servers was doling out commands to compromised machines, evading detection and keeping the command server online were vitally important. But that's all changed now. With many botnet operators maintaining dozens or sometimes hundreds of C&C servers around the world at any one time, the effect of taking a handful of them offline is negligible, experts say, making takedown operations increasingly complicated and time-consuming. It's security through ubiquity. Security researchers say this change, which has been occurring gradually in the last couple of years, has made life much more difficult for them. ... Researchers in recent months have identified and cleaned hundreds of domains being used by the Gumblar botnet, but that's had little effect on the botnet's overall operation."
This discussion has been archived. No new comments can be posted.

Botnets Using Ubiquity For Security

Comments Filter:
  • by AHuxley ( 892839 ) on Monday June 07, 2010 @11:46PM (#32492198) Journal
    http://www.acma.gov.au/WEB/STANDARD..PC/pc=PC_310317 [acma.gov.au]
    "The AISI collects data from various sources on computers exhibiting 'bot' behaviour on the Australian internet.
    Using this data, the ACMA provides daily reports to ISPs identifying IP addresses on their networks that have been
    reported in the previous 24-hour period.
    ISPs can then inform their customer that their computer appears to be compromised and provide advice on how they can fix it."

    The only question seems to be when will p2p be seen as a botnet, limewire ect. Will the Anti-Counterfeiting Trade Agreement (ACTA) alter 'bot' behaviour to new areas isp use and account 'fixing'?
    Will isp's get powers to pop packets to note 'bot' behaviour early on, rather than seeing their ip's reported back days later?
  • ISP accountability (Score:3, Interesting)

    by drDugan ( 219551 ) * on Monday June 07, 2010 @11:55PM (#32492226) Homepage

    It seems to me there is an accountability gap for ISPs. Those providing network connections are not held accountable for machines on their network. Yet another example of prices and business practices not matching the real costs of activities.

    To me, I would think the real solution, long term, to fixing botnets is creating a tight loop with internal scanning, reporting, warnings, verification, and then turning off Internet connection to machines that are infected. ISPs will need to be "motivated" to take responsibility for actions taken on their network, and they will have to have fully automated systems that take infected machines offline.

    It doesn't seem like this is a priority for ISPs yet. Its easier and cheaper to simply ignore the problem.

  • by RobertSeattle ( 1345313 ) on Monday June 07, 2010 @11:55PM (#32492234)
    My small 16 person company gets an average of 300K Directory Harvesting emails a day - everyday - day in day out. All I have to say is I appreciate the jerks running the botnets for not killing my domain with 30 Million of these a day. They throttle their crap to a certain level somehow so they are annoying but not crippling. Gee, thanks, I guess.
  • by Splab ( 574204 ) on Tuesday June 08, 2010 @12:21AM (#32492370)

    BS, ISPs are just lazy. Here in Denmark at least a couple of the ISPs will actively block your connection if they detect botnet-like activity from your machine. When flagged any requests will be directed to a homepage where they tell you that you probably are infected and asks you to contact support for further assitance.

  • Efficiency (Score:3, Interesting)

    by w00tsauce ( 1482311 ) on Tuesday June 08, 2010 @12:26AM (#32492388)
    I for one think botnets are uber cool, a testament to the efficiency of the internet. Using computers that would normally sit idle to do something, even if it's detrimental is just plain cool. I also think botnets foreshadow the future of the internet, where most applications work by p2p instead of the normal client-server relationship.
  • by Anonymous Coward on Tuesday June 08, 2010 @12:34AM (#32492424)

    It's a very dangerous route to go down. If all isps did that, I'm pretty sure that botnets would start encrypting their c&c data. Then what? If you just block all data you can't understand, say good-bye to vpn, legit p2p applications, and private communications between actual people.
    Of course, if you detect that your customers are ddosing some server, that's a different story.

  •     Tie your spam filtering software into your firewall. Nothing says loving like dropping their inbound traffic. :) We only receive about 20k spams/day now (versus more than 300k before), just by having rolling blacklists based on spammy inbound traffic. You'll get a handful through, but nothing else will come in for days.

Stellar rays prove fibbing never pays. Embezzlement is another matter.

Working...