Hackers Increasingly Using Twitter For Botnets 56
Trailrunner7 writes "Spammers aren't the only ones who have figured out that social networks like Twitter and Facebook are good for business. Sophisticated hackers conducting targeted attacks are also using the networks as a tool to manage malware installations on victims' networks.
Mandiant's latest "M-Trends" report, released on Thursday, says that the company has observed an increasing number of so-called "Advanced Persistent Threats" that are hijacking legitimate social networks and Web based services, including Facebook, Google Chat and MSN as command and control networks for malware installations. The revelation is part of a larger trend that saw sophisticated attacks on commercial entities outstrip attacks on the networks of government agencies and defense industry players, Mandiant reported."
Why? (Score:2)
I don't understand what the incentive is to stop using IRC for command and control.
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
You seem to be confusing the C&C network with the infection vector. This article is about hackers using twitter, etc, as a way to provide instructions to their botnets.
Re: (Score:3)
Twitter's popularity and reputation mean it is less likely to be blocked, and traffic to it is less likely to be scrutinized by security analysts.
Re: (Score:1)
Undeserved? IRC is ridiculous and has been for some time.
Basic outline of any IRC chatroom:
captnitro: hey whats goin on
ice8229: no fuck that
captnitro: what?
peebles: your mother is a whore, you know it
ice8229: i'm not going to buy a goddamn program just to rip
ice8229: anybody know of an open one?
fisher0: i kno cuz i fuckerd her d00d
captnitro: what the hell is going on here?
adbot: MP3Z MOVIEZ WAREZ BAGELZ go to 62.182.100.10
binaryman: 1000100011110101
captnitro: huh?
binaryman: 1001111010111110
sharky: get out
Re:Why? (Score:5, Informative)
Because you generally have to run your own servers which means you need your own domains (or hijack someone else) and DNS/Domains/Servers become very weak point of failure. Not to mention it's easy to discover viruses if you know which server they are connecting to. GTalk and Twitter traffic is pretty indistinguishable from legit traffic and it's easier to hide.
Re: (Score:2)
Because you generally have to run your own servers
What's wrong with a private channel on a public network? (Or several for redundancy)
which means you need your own domains
What's wrong with a list of IP addresses?
Re: (Score:2)
Re: (Score:2)
What's wrong with a private channel on a public network? (Or several for redundancy)
When I was an IRCop, whenever I found a c&c channel I would put a bot in there to gline anyone who entered. About once a month or so we'd go on hunting trips to find bots reporting to our network. Rather than build the redundancy of multiple networks into the malware, they'd rather use a system they can still fly under the radar on.
What's wrong with a list of IP addresses?
DHCP. You can't expect to find a box that can't be traced back to you and rely on it keeping the same IP address.
A list of IPs or IRC networks are finite resources. The
Re: (Score:2)
Generally IRC is no longer a good C&C protocol for a number of reasons:
1) Companies are increasingly putting in place protocol filters, so that only pure HTTP gets out of the company,
2) IRC runs on a port that is almost always blocked, you could use your servers but then you come again to the problem of "your servers",
3) IRC has problems getting out through company proxies.
4) You asked "what is wrong with a list of IP addresses,
Re: (Score:2)
It's interesting to read about this, I played around with tweet-my-pc a while ago and the amount of control available through the twitter system is interesting. Putting your CnC on a massive and pervasive system that someone else keeps up and pays the bills for (FB or twitter) is brilliant.
However, I heard th
Re: (Score:1)
Because you generally have to run your own servers which means you need your own domains (or hijack someone else) and DNS/Domains/Servers become very weak point of failure. Not to mention it's easy to discover viruses if you know which server they are connecting to. GTalk and Twitter traffic is pretty indistinguishable from legit traffic and it's easier to hide.
IRC servers are still fairly popular, and there are more than enough of them to exploit. How is using a social-network any less a point-of-failure than IRC? What makes HTTP or UDP any more or less distinguishable than plain old TCP?
Re: (Score:2)
Re:Why? (Score:5, Insightful)
Companies are more aggressively blocking outbound traffic to services not needed by most users, such as IRC. Whereas egress HTTP/s is almost universally permitted.
Re:Why? (Score:4, Insightful)
Getting through firewalls, I should imagine. Companies are likely to block IRC but they dare not block Twits-R-us and FaceSpace. Traffic there also seems less likely to trigger IDSs.
Re: (Score:2)
Re: (Score:2)
This shouldn't even be an issue for Corporate networks as both of those sites are probably blacklisted on the proxy server.
I don't think this is true. Most corporations these days have twitter and Facebook accounts as marketing tools. Also the execs like to go one there and spout nonsense and us it for recreation In many companies employees are encouraged to visit both sites during the day. I'm not sure of the reasoning for this (other than to make them seem more popular?) but I've seen it at several corporations.
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
IRC is less widely used than Twitter, so it is much easier to hide the command and control among the mass of Twitter messages. Also Twitter uses standard HTTP port, which is less likely to be blocked than an IRC port.
Re: (Score:2)
Re: (Score:1)
Perhaps because http is far less likely to ever be blocked by the victim, either intentionally or because they bought some new network hardware. Also, the main use of twitter would be to inform the bot where to go if its current C&C server was taken out. At that point, it would probably try a variety of protocols to reach it until one worked.
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Because most public IRC networks actively go out of their way to rid their networks of channels used for C&C. They don't want botnets either.
Re: (Score:2)
you simply rely on a social network being more persistent I think. Maybe they only take it as an alternative.
Having to rely on IRC may need your own infrastructure, or relying on other irc services, or at least dns systems to redirect the listening ears of your little cochroaches.
Whoever thought some stupid oneliners on a fake account somewhere might trigger a DDoS attack after all?
Maybe aboing all those bot-ladies knocking on my twitter account and listening to their sexy chitchat has some pattern... mhhmm
orly? (Score:2)
A lot of it might have to do (Score:2)
Using web services to store and transmit data? (Score:3)
Gee George, deez hackers shore are sophistimacated!
Re: (Score:2)
Re: (Score:2)
You issue it a base64 encoded URL where to get more instructions. Then the attacker can use any website, google pages, etc to issue the command.
I followed one of them once, they usually added layers of abstraction to make it 'difficult' for a human to follow. Meaning one tweet, lead to another tweet, lead to another tweet, lead to a URL, which had another URL which then contained something like "ping whitehouse.gov"
Re: (Score:2)
You issue [a] URL where to get more instructions. Then the attacker can use any website, google pages, etc to issue the command.
Yes you can. And this *isn't* hacking, cracking, or any hot sound-byte word.
I thought they were using Telnet? (Score:1)
Those hackers must be busy....
Re: (Score:1)
Command received. \/14gR4 ads transmitting now. Nigerian prince story queued.
Teamwork = Teams in any form (Score:1)
old news (Score:1)
I posted about this being the case way back (5 years ago?) when people were talking about IRC bots and CCs, but I got to say, it is impressive that now so many years later, people are catching up to this style of thinking, gives me hope for hackers out there..