Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security Science

Storm Dismantled at USENIX LEET Workshop 58

An anonymous reader writes "The USENIX LEET workshop held earlier this week in San Francisco offered neat insights into the Storm botnet, including two papers showing the difficulty of accurately measuring the botnet's size, and one on the way it conducts its spamming campaigns (down to the template language used). There was a bunch of other cool work too, so check out the papers."
This discussion has been archived. No new comments can be posted.

Storm Dismantled at USENIX LEET Workshop

Comments Filter:
  • by nweaver ( 113078 ) on Thursday April 17, 2008 @05:41PM (#23111888) Homepage
  • Nifty (Score:5, Insightful)

    by locokamil ( 850008 ) on Thursday April 17, 2008 @05:52PM (#23111994) Homepage
    After reading the article, I'm impressed by both the ingenuity of the researchers in infiltrating the network, and also by the skills of the malware writers. Engineering a DHT-based network is no trivial matter, and the fact that people out there went through the trouble of creating one implies that the payoff must have been commensurate to the effort involved.

    Scary.
    • Re: (Score:1, Insightful)

      by Anonymous Coward
      Think about it in this way:
      You can hire PhD level programmer for around £500 per month full time. Think how much for 18 year old whizz kid?

      Believe me those guys are good. No questions asked.
    • Re:Nifty (Score:4, Insightful)

      by Pig Hogger ( 10379 ) <pig DOT hogger AT gmail DOT com> on Thursday April 17, 2008 @06:23PM (#23112216) Journal

      After reading the article, I'm impressed by both the ingenuity of the researchers in infiltrating the network, and also by the skills of the malware writers. Engineering a DHT-based network is no trivial matter, and the fact that people out there went through the trouble of creating one implies that the payoff must have been commensurate to the effort involved.
      Given how the "legit" private sector treats it's employees like shit (layoffs, outsourcing, PHBs, etc.), it's no surprise that there is no shortage of disgruntled employees who will gladly write malware for a good payoff or simply for revenge.
      • Or maybe they're just padding their resume to get a new job?

        - RG>
        • yeah, if you can build a botnet like that, chances are very good you could get a job at the air force... i heard they're doing some attacks of their own, which the ability to covertly take control of millions of computers for simultaneous internetwork traffic would certainly be useful for. imagine every computer on the botnet loading OPEC's website at the same time!

          http://it.slashdot.org/article.pl?sid=08/04/04/1639219 [slashdot.org]

    • Re:Nifty (Score:5, Interesting)

      by plover ( 150551 ) * on Thursday April 17, 2008 @08:27PM (#23113064) Homepage Journal
      Then you should be impressed by the right people, like Enzo Michelangeli, who wrote the KadC [sourceforge.net] DHT library that the storm worm authors used.

      Sure, these guys are somewhat clever, but they're not the real geniuses behind the technology.

      And yes, the researchers did a great job, too. It's not easy picking unknown protocols apart!

    • by fm6 ( 162816 )
      These are serious computer scientists. You can tell because they write their pseudocode in a variant of Algol [wikipedia.org].
  • by Fluffeh ( 1273756 ) on Thursday April 17, 2008 @05:55PM (#23112020)
    I hate spam and what botnets do as much as the next fellow, to the point where I stopped checking email on a regular basis from a few accounts due to the insane amounts of spam I got, but I still have to admire the sheer beauty and audacity of putting together such a living thing. If only they could find a useful (even semi-legit) purpose for harnessing so much computing power.
    • to the point where I stopped checking email on a regular basis from a few accounts due to the insane amounts of spam I got
      Are you able to set up Spamassassin for any of those accounts? (it can even run client side through some email apps) I've been using it for awhile now and on a fairly dense setting (level 2) it gets practically all of my spam, and still lets the good stuff through.
      • I have tried a large number of anti-spam products, both on the servers themselves and client side. At the moment, I generally just purge the account before I am expecting something to come in. The main emails are pulling in 12-1600 spams a day :(
    • by Anonymous Coward on Thursday April 17, 2008 @06:09PM (#23112116)
      I think we should take over the botnet and use it as a spam filter. That would be semi-legit, right?
      • Thats an excellent idea.
      • In a strange way you could be right.
        How wrong would sending the command for a DDOS attack on 127.0.0.1 into the P2P network be.
        Maybe if their own machines were banjaxed the owners of these botnet hosts might take a look at getting them fixed?

        This is just a first thought as I read through the paper and I may have over simplified massively?

      • by redxxx ( 1194349 )
        Where's the fun in that?

        Wouldn't it be more entertaining to introduce the ability for the clients to modify themselves(such as new methods of distribution and concealment) based on modules that could be distributed across the network.

        Maybe eventually make modules that let it look for other malware, and replace the payload with itself(which would also be distributed around the network. Wouldn't need to be all that efficient or effective with a few hundred thousand computers running it. A success here or th
      • Why not just take it over and use it for something constructive, like protein folding or something?

        Oh, right -- because then we'd be breaking the law, and the botnet operators might sue us.
    • by Sleepy ( 4551 )
      I get 3 spams per day in my inbox, and my email address is in Google from unscrubbed UNIX mailing lists. My Spam folder is a mess, but I rarely have to do much there.

      +1 on the other poster regarding SpamAssassin. I maintain a server install of it and it rocks. If you are a user, you can still run RBL checks on email (header parsing), and URIBL gets rid of tons or Google-hosted (Blocgspot) spam.

      Now, the SA ruleset is good (organization could be better from a developer perspective... lots of overlapping rules
    • by fm6 ( 162816 )
      If you start by hacking into somebody's computer and stealing both CPU time and network bandwidth, you've already lost any legitimacy, no matter how you use the resources you've stolen. But yeah, these botnets are an impressive achievement.
  • by Anonymous Coward
    Does this run on Linux?
    • No. It's Windows malware.
      • For that reason, I have been wondering why USENIX is wasting time on it.

        Didn't USENIX used to be about Unix and interesting stuff?
        • It's good to study zombies before the dawn of the dead (when all windows boxen are part of some botnet), because they affect unix boxen via the 'net
        • Key is "used to". 20 or 30 years ago interesting stuff, or advanced computer research, was limited to *nix (BSD vs SysV - fight!). USENIX has conferences on a bunch of research areas, file systems, security, sysadmin, etc. See:

          http://www.usenix.org/about/

          And yes, I work for USENIX, but I'm posting on my own.
  • misnomer? (Score:5, Informative)

    by B3ryllium ( 571199 ) on Thursday April 17, 2008 @06:07PM (#23112102) Homepage
    Is "dismantled" really the right word? Shouldn't it be "vivisected", since the botnet is still running?

    Dismantled implies that it's shut down. Last I heard, it was still running, and sub-botnets (tropical depressions?) were being sold. Botnet franchising, if you will.
    • That's the first thing I thought of, too. Vivisected is a cool word, or something more mundane like dissected being as it wasn't really "alive" to begin with.

      But hey, why let a little thing like clear communication force you to do boring things like "learning" and "reading". It's much more fun to throw random semi-related words together with meanings that aren't what you're actually trying to say.

      The ironing is delicious.
      • Well, it's capable of communication ... and it's constructed sort of like a neural network. If it gains sentience, the term will apply.

        However, since it hasn't yet, perhaps I should have used a calmer and more rational word, such as "analyzed".

        It doesn't have the same visceral impact as "vivisected", but it makes up for that by being both academic and explanatory - unlike "dismantled", which makes it sound like it has a cameo in WALL-E.
    • by modulo ( 172960 )
      I think "deconstructed" is what they had in mind (in the loose sense of "analyzed"), using literature as a metaphor, but "dismantled" makes a better headline.
  • by falsemover ( 190073 ) on Thursday April 17, 2008 @06:39PM (#23112344)

    "... With Your Humongous New Cock." (actual subject header of spam email received)

    Seriously, we haven't had this kind of inspired ribald poetry since William Shakespeare.

    I say bring it on, we need the spam entertainment.

    SAVE THE BOTNET - SPAM IS ART

    Dans la viande a bon marche, il est poesie

  • OMG (Score:1, Insightful)

    by PenguSven ( 988769 )
    After reading up a little more on botnets, it's clear now that SkyNet will in fact originate as a spam and DOS attack/delivery "platform", which will become sentient, and try to kill us all by destroying the internet!
    • Re: (Score:3, Funny)

      by socsoc ( 1116769 )
      Kill us all by destroying the Internet? But I learned last night that when the Internet stops working, everyone will just head out the Californee way.
  • by symbolset ( 646467 ) on Thursday April 17, 2008 @06:53PM (#23112460) Journal

    We used different releases of three web browsers, resulting in a total of eight different browser versions. The results indicate that Storm exploits only web browsers with a specific User-Agent, a HTTP request header field specifying the browser version. If this header field specifies a non-vulnerable browser, the malicious server does not send the exploit to the client. However, if the client seems to be vulnerable, the server sends between three and six different exploits for vulnerabilities commonly found in this browser or in common browser-addons. The goal of all these exploits is to install a copy of the Storm binary on the visitor's machine. We observed that the actual exploit used in the malicious Web sites is polymorphic, i.e., the exploit code changes periodically, in this case every minute, which complicates signature-based detection of these malicious sites.

    So... three guesses what user-agent it's looking for.

  • by Schnoodledorfer ( 1223854 ) on Thursday April 17, 2008 @07:30PM (#23112690)
    How about this one: Designing and Implementing Malicious Hardware [usenix.org]? Now that people are figuring out how to deal with Storm, we may have to start worrying about bogus ICs that will be designed to allow your computer to be compromised easily. Damn! Interesting, though. It was awarded "Best Paper".
    • The primary obstacle I see with their "malicious hardware" design is that of the actual malicious hardware creation. They create a FPGA processor that they can use to steal shadow password files, but are most modern processors purchased by most individuals or organizations able to be reproduced with FPGAs? Perhaps in the intermediate to distant future, but if you can't fake a new Intel or AMD chip, your targets seem limited...
      • by AuMatar ( 183847 )
        Not that I see this as a practical attack anytime soon, but it doesn't need to target the main processor. It would be far more efficient to target a smaller subprocessor. The one that comes to mine is the PIC, its an extremely simple chip thats well over a decade old. Easily done via FPGA. Northbridge and southbridge might be targets as well.
  • by illama ( 1275186 ) on Thursday April 17, 2008 @09:57PM (#23113600)
    FTA:

    Second, Storm synchronizes the system time of the infected machine with the help of the Network Time Protocol (NTP). This means that each infected machine has an accurate clock.
    See, it's not all bad!
    • First question that pops into my mind is would changing your time to some "wrong" value be a potential litmus test for this botnet? If you did and it changed back at some point and you were sure there were no other synchronization processes running on your machine, it might be a clue that you were infected. .o.
  • Second, Storm synchronizes the system time of the infected machine with the help of the Network Time Protocol (NTP). This means that each infected machine has an accurate clock.
    My fiancee's computer never has the correct time. I guess that rules out the cause as being storm worm related.
  • Microsoft needs to quit screwing with the interface of Office 07 and spend some time doing something useful like creating a CD image of WinPE or even a bartpe plugin that includes a scanner for (at least) the major botnet software. Just release a new one every month or two, burn it, reboot, scan. I mean, really, this crap is getting ridiculous. MS just needs to take a bank of 1000 pc's, load xp with no service packs or security and live ip addresses, wait about 20 minutes, and then turn on the sniffers. I d
  • ...when the guys behind it are still RUNNING it right now? I mean, sure it's a wonderful what these researchers were able to find out, but when the potential exists for even more serious crimes to be committed by means of this mechanism, why are we telling the people behind it what they need to think about when designing version 4.0?

As of next Thursday, UNIX will be flushed in favor of TOPS-10. Please update your programs.

Working...