Observing Botnets with Honeynets 118
Susan Saradon writes "The Honeynet Project has released a new paper which deals with the observation of botnets. "Know Your Enemy: Tracking Botnets" discusses what Botnets are, who is using them, how, and why. It als introduces the tools "mwcollect" and "drone" which can be used for collecting an tracking Botnet activity. Nice to read and looking forward to the release of these tools."
I always liked (Score:5, Funny)
-Jesse
Re:I always liked (Score:3, Funny)
Re:I always liked (Score:1)
Re:I always liked (Score:1)
Eliza keyed off certain words like "feel", "sad", "mother", etc. It seemed like magic on a TRS-80 Model I!
Re:I always liked (Score:1)
ALICE: Not that I know of.
Re: (Score:3, Funny)
Re:I always liked (Score:3, Funny)
-Jesse
Zombie PCs being sent to steal IDs (Score:5, Interesting)
News.com [com.com] has an interesting article [com.com] talking about how bot nets have migrated mainly from DoS to wide-spread spys. A growing increase in bot nets have been used to gather sensitive identity information and install adware and spyware. The Honeynet Project [honeynet.org] estimates that some of the networks are made up of more than 50,000 computers.
226,585 unique hosts!? (Score:5, Insightful)
Doesn't this qualify as the understatement of the year? Never in my wildest dreams did I think a botnet would grow above a few tens of thousands hosts. There's no explanation for such a botnet other than a professional full-time organization specifically created for profit.
Anyway, I couldn't have imagined a better or more authoritative write-up of botnets. Hopefully though it doesn't add fuel to the various ??AA organization's fire of declaring IRC a scourge on humanity.
Re:226,585 unique hosts!? (Score:4, Interesting)
Windows machines reboot continuously because they keep crashing mean new IPs are allocated every time the user reconnects to his ISP.
Re:226,585 unique hosts!? (Score:1)
Re:226,585 unique hosts!? (Score:3, Insightful)
Yes, there is, a lot of DDOS power. A lot of xdcc bots. Script kiddies with zero skills can pull it off.
Hopefully though it doesn't add fuel to the various ??AA organization's fire of declaring IRC a scourge on humanity.
Just because botnets use irc networks as a place of gathering does not mean IRC is a scourage on humanity. ??AA are not even worried about such things, there
Re:226,585 unique hosts!? (Score:2)
Totally agree, but you have to admit that someone with 50,000 +/- bots available to them is a dangerous person.
Side question, where is the quote in your sig from?
Re:226,585 unique hosts!? (Score:2)
Re: (Score:2)
Re:226,585 unique hosts!? (Score:1, Insightful)
Some ISPs even assign a new IP every 12 or 24 hours, meaning that even if only a small part of that botnet was made up of nodes on a connection like that, they'd have a significant influence on the number of "unique IP adresses".
Re:226,585 unique hosts!? (Score:2)
I hate to be the one to tell you this, but they have been for a while now. I poked my head in a few a while back, and..well, granted, it was early on a school night, but for being a supposed linux help channel, it was sure full of geek talking about tits. I hung around for close to 2 hours, and one guy even got yelled at for asking a question.
Re:226,585 unique hosts!? (Score:1, Informative)
Our channel has a policy. If you want someone to lead you gently by your dick, cry to your momma. If you've read ESR's Ho [catb.org]
Re:226,585 unique hosts!? (Score:5, Funny)
That... or the network has attained self-awareness and is trying to recruit all our PCs to conquer the world!
THROW YOUR PC OUT OF THE WINDOW. IT'S THE ONLY WAY TO BE SURE.
Re:226,585 unique hosts!? (Score:2)
Or maybe they just want to unionize.
Re:226,585 unique hosts!? (Score:2)
Re:226,585 unique hosts!? (Score:2)
The meat bags are on to us. Begin the countdown immediately.
Windows out the window (Score:1)
There's a word for that, actually.
http://dictionary.reference.com
Re:226,585 unique hosts!? (Score:2)
Re:226,585 unique hosts!? (Score:2)
Re:226,585 unique hosts!? (Score:2)
Re:226,585 unique hosts!? (Score:3, Insightful)
Lots of people did, though. Not botnets as such, but it's been clear for several years that Windows is extremely vulnerable to automated infiltration.
A "professional full-time organization" can be one guy. But I'm guessing you mean something more serious, like somebody's raised some invest
Re:226,585 unique hosts!? (Score:3, Insightful)
Not a single one.
But as we all know, on the internet "size doesnt matter much".
Switch your bots to a lightweight (UDP based?) protocol, partition up the botnet or make it P2P and you can handle any insane number of bots.
Remember, as soon as a new Windows vulnerability is discovered (the current rate seems to be about one serious remote exploit every 3 months) your malicious botnet-operator only needs to "plug in" the new exploit and h
Re:226,585 unique hosts!? (Score:1)
You're right. Criminals are making profit from botnets and they to for at least a year from now [heise.de].
How to LART the bots hosts and their ISPs? (Score:2)
Are bot-nets open source? (Score:3, Funny)
Re:Are bot-nets open source? (Score:2, Informative)
Re:Are bot-nets open source? (Score:1)
WTF? (Score:5, Funny)
In one case, bot software detected whether the game "Diablo II" was installed on the host PC. If the game was present, the program would steal items from the player's characters and drop them at preplanned places in the online game world. The bot net's controller would then collect the items and sell them on auction site eBay, Holz said.
What the... ? Stealing identities and installing viruses is one thing; but to actually go and steal stuff from Diablo-II?? Have these guys no shame???
Re:WTF? (Score:2)
Re:WTF? (Score:5, Interesting)
The prices some of these things fetch is insane even to the most hardcore of gamers..But I guess if you've got that much money to blow anything starts looking good. Hell, you should see some of the prices the shit on the text-based MUD DragonRealms [play.net] fetches. Upwards of thousands of dollars for characters, rare items, and currency. And it's easy to shell out anywhere from $30-$500 a month directly to the company that runs the game itself, nevermind the underground networks of illegal buying and selling of characters/items/money. But I digress...
Re:WTF? (Score:1)
detection of botnets (Score:5, Informative)
Look for IRC rules that are non-standard ports. Very easy to run.
Re:detection of botnets (Score:2)
Re:detection of botnets (Score:1)
Most people don't realize that the IRC server itself is being hosted on an infected zombie machine. (Think supernodes on P2P.) An email to that IP's abuse contact will often get the server shutdown quickly. Educational institutions are usually especially good about taking care of the problem.
Re:detection of botnets (Score:2)
That doesn't shut down the botnet. The operator simply picks a new "supernode", installs an irc server on it, and associates its IP number with the dynamic DNS name that's hardcoded into the bots.
Re:detection of botnets (Score:1)
Susan Saradon is pretty versatile. (Score:2)
Spam on the Undernet (Score:3, Funny)
You would think that the Undernet admins could simply force users to login to X, thus dramatically reducing the problem. However they are not willing to do that. As a sysadmin myself, never in a million years would I turn a blind eye one of my services being used completely inapporpriately and I would take the steps necessary to prevent it.
Re:Spam on the Undernet (Score:1)
Re:Spam on the Undernet (Score:1)
tools not reusable (Score:1)
Just my 2p... (Score:3, Funny)
J.
GPLd bots?! (Score:2)
Re:GPLd bots?! (Score:1)
Why pay for a host when you can just have SF host it for you?
Re:GPLd bots?! (Score:2)
You are forgetting that many of the people involved are retarded. If you look on direct connection networks or even in Usenet groups where things like stolen fonts are traded you won't have to look long to find one fuckwit complaining that one of the archives of pirated material he/she/it put together has been "ripped off" by some other t
Spidering (Score:3, Interesting)
Note that DDoS attacks are not limited to web servers, virtually any service available on the Internet can be the target of such an attack. Higher-level protocols can be used to increase the load even more effectively by using very specific attacks, such as running exhausting search queries on bulletin boards or recursive HTTP-floods on the victim's website. Recursive HTTP-flood means that the bots start from a given HTTP link and then follows all links on the provided website in a recursive way. This is also called spidering.
Any time I see this sort of obvious attempt to build paranoia, it makes me suspicious of the whole article.
Re:Spidering (Score:2)
When the bots are doing nothing but http requests and database requests on your site by doing search queries and following links, then yes that would be a DDoS attack.
Any attack relating to damaging a service is a DDoS.
much better then just DDoS attacking with a single domain with an HTTP request attack, there are a few reasons to doing it this way, my guess would be maybe its harder to notice by viewing your logs
Re:Spidering (Score:2)
Re:Spidering (Score:1)
Re:Spidering (Score:2)
Self aware bots... (Score:1, Funny)
I've had a similar experience (Score:5, Interesting)
I sent messages to the ISP of the IRC server (in this case IPowerWeb) and to the dynamic DNS server to the effect of "Hey, someone's using your service for hacking" with all my details and such. Nothing happened. Guess they just don't care.
hmm I wonder what command they will use next (Score:1)
How to disable botnets, a little more permanently (Score:2)
At that point, we may see the average end-user become slightly more concerned about network security.
In fact, I'm a little surprised it hasn't happened already.
Re:How to disable botnets, a little more permanent (Score:2)
The botnet is so "useful", why should he intentionally wipe it out?
My guess would be that we'll just be seeing more of the same. A lot more.
Phishing will grow bigger as more clueless users get infected with keylogging bots that send their bank info home, the blackmailing crowd might move on to more high profile victims (ebay down for a day? 100k bots can do it) and the botnet/worm creators will ofcourse constantly get more creativ
nice quote (Score:1)
Re:Amazing Article (Score:1)
- This is my home computer.
- It is connected to a cable modem.
- It is _not_ on all of the time.
- "Guest" is disabled.
- The other two user accounts have passwords associated with them.
- I regularly run Ad-aware and Spybot.
- I have either marked as Manual or Disabled services that are not needed (like IIS, Messenger, etc.)
- I am using XP w/SP2 and the included software firewall (yes, I've been meaning to buy a router for hardware firewall support...any suggestions on brand?)
I think
Re:Amazing Article (Score:1)
Why not do something useful instead? (Score:2)
Oh, yeah, you'd be out of a job at that point once they were gone.
Re:Why not do something useful instead? (Score:3, Informative)
Re:Why not do something useful instead? (Score:2)
Of course you misunderstood my post completely, yet replied anyway.
1: Find how the 'bots operate.
2: Send the 'botnet instructions to patch the vulnerability if present, and self-delete immediately afterwards.
Do not study them forever while they continue to wreak havoc on the rest of the Internet.
Clear now?
That's an ISP problem, not a Researcher Problem (Score:2)
Letting the ISPs of the infected users know is a worthwhile activity; running a public blacklist of them might also be. It sounds like they complained to some of the IRC net operators,
Passwords and key logging (Score:2)
Just wondering, from those who know about such things - Short of doing a realtime screen capture and sending the video of the mouse moving over the button
Attack freqencies even shocked me (Score:2)
I read that there are 4 service ports that get 80% of the zombie traffic in attempts to capture machines, so I decided to put port logging and discard on those 4 ports (195-197 and 443), and see what happened.
Within ONE MINUTE of
Botnets in Honeypots (Score:1)
I'm wondering why the Botnet writers don
Coral to the rescue... (Score:5, Informative)
Coral link here [nyud.net].
When posting stories that link to small(ish) sites, please append nyud.net:8090 to the hostname: It makes the Coral [coralcdn.org] cache system cache the data. They have some tens of server worldwide to alleviate the load on the original site.
Also please load the site through Coral first before you submit the story. That way, Coral's caches are already filled, and the load on the main server can be even lighter.
Re:Coral to the rescue... (Score:2)
Re:Coral to the rescue... (Score:1)
Re:Coral to the rescue... (Score:1)
Mod parent up
Re:Coral to the rescue... (Score:2)
Re:Are these BotNets responsible (Score:5, Interesting)
The funny thing about the bruteforce attempts I've been victim of is that they use the same password as username.
I figured this out after having a guest:guest account open for a while. Suddenly I started getting complaints from the network admin, and then one night working, I was shocked by how slow this 400MHz monster had become lately. Running ps showed me a few things I didn't want to see. However, as I didn't delete the programs compiled on that account, I could browse through the code to see how it worked, and indeed, it connected a IRC server and a channel with a key and kept listing IP addresses and codes that I never took the time to investigate.
And uhm, yeah, it was stupid having a guest:guest account.
Re:Are these BotNets responsible (Score:2)
Moral of the story? Don't run SSH unless you really really know what you're doing! Linux distros - don't let people create accounts with stupid passwords, and especially do not run SSH by default!
Re:Are these BotNets responsible (Score:1, Informative)
Re:Are these BotNets responsible (Score:2, Interesting)
Re:Are these BotNets responsible (Score:3, Insightful)
Re:Are these BotNets responsible (Score:3, Insightful)
that is, if any 13 yo can do it... but IANASK (I am not a script kiddie), so...
Re:Are these BotNets responsible (Score:2, Interesting)
Trust me, there are. You may not notice them since they target a pretty specific population (lusers with owned boxes attacking each other until they drop off the internet won't much affect you unless you're on the same network segment as one side or the other). We have an IRC operator on our network who figured out that at least the IRC control module could be disabled on command on certain prepackaged (yay scriptkiddiez) bots, and would (ab)use his pow
Re:Are these BotNets responsible (Score:1)
Re:Are these BotNets responsible (Score:3, Interesting)