CA Warns Of Massive Botnet Attack 357
m4dm4n wrote to mention a story running on The Register which describes a coordinated malware attack designed to establish a massive botnet. From the article: "The attack involves three different Trojans - Glieder, Fantibag and Mitglieder - in a co-ordinated assault designed to establish a huge botnet under the control of hackers. Computer Associates reckons that access to the compromised PCs is for sale on a black market, at prices as low as five cents per PC."
Now.. (Score:5, Funny)
Re:Now.. (Score:3, Funny)
Come to think of it, the operator is probabil not from US or Western Europe, if they were, they would have had something like 25c/machine, maybe even have a deal: buy 100 for the price of 90. Or perhaps, offer coupons to the slashdot geeks or something.
I personally would be interested and I would buy the botnet just so I can have it attack itself to see what happens.
Re:Now.. (Score:3, Funny)
Re:Now.. (Score:3, Funny)
"Yes, sir, Mr. Gates."
LOL. Well it is one thing that Microsoft could do to improve its security, at least in the short term. Kinda sets a bad example, though.
Five cents per compromised machine???
Now the question is, What is the going rate for compromised Linux boxes? Or better yet, for compromised OpenBSD boxes?
That my friends is how you can measure the effectiveness of the security.
Tickets? (Score:3, Interesting)
Where can I buy tickets to view the fireworks? I'm gonna get some beers and stakeout at my local backbone uplink =^D
Sad but true is that this precisely gives governments the idea that they should limit and control international traffic. Freedom? not for long...
Re:Tickets? (Score:4, Insightful)
Half Price Zombie PCs. (Score:5, Funny)
Evolution, baby (Score:4, Insightful)
And in the meantime, technology gets more sophisticated. Progress eitherway.
Re:Evolution, baby (Score:2, Funny)
This is interesting... (Score:3, Interesting)
Re:This is interesting... (Score:2, Interesting)
1. The MySQL Databases' Tables keep getting Corrupted
2. The disk writes in OpenBSD are extremely slow.
So I had decided the best approach is to use OpenBSD with (its wonderful) PF as my firewall and use FreeBSD as the actual servers (with the chroot trickery that OpenBSD does by default). This setup has been rock solid so far.
Re:This is interesting... (Score:2)
Re:This is interesting... (Score:5, Insightful)
I remember my early days with Linux, back when I used to futz around and actually made my machines less secure, before I learned a great deal more about the OS and its features.
I am not saying that switching is bad, I am just saying that it is important to know what you are switching to before making the switch.
Nobody should get caught with their firewall down holding their LAN cable in their hand...
Re:This is interesting... (Score:5, Informative)
It does ship *secure* out of the box. No remote exploits.
Don't open any ports until you get the hang of it.
Either way, it won't be *more* dangerous than Windows
Talking about one machine? (Score:3, Insightful)
You can't just wake up one day and decide that you are going to switch all your network servers and workstations to a new OS over the course of a few days. These things take time.
Re:This is interesting... (Score:5, Insightful)
As great and infallible as non-Windows OSs are, these same problems exist with Linux, Mac et al, just on a much smaller scale. Having some 95% of all desktops, Windows is the natural target here.
The problem isn't Windows or Microsoft. The problem is the **users**. They open email attachments without questioning the source. They don't run anti-virus software (or don't maintain the subscription). They don't employ firewalls. They don't update and patch their systems. They don't scan their systems for adware.
Yes, IE allows adware to be installed. Yes, Windows has the RPC hole. Yes, the windows kernel is, has been, and most likely will always be, insecure. But there are steps that a user can take to protect themselves. I have used Windows since Win286 and I have never been infected with a virus, never been compromised by a worm and never been the victim of spyware. I'm not an anti-MS person but I don't blindly use their software. I have more *nix servers than Windows servers but you could hardly consider me a fanatic.
True, I'm an IT professional and have a greater knowledge of PCs than 99% of users out there (just like the rest of us here), but it's not rocket science to keep yourself protected.
If the Penguin Dream of taking over the desktop ever comes true, you can bet that viruses, trojans, adware, etc will become an epidemic on Linux just as it is on Windows.
Remember: dumb users are platform-independent.
Sweet (Score:5, Funny)
Re:Sweet (Score:2)
SETI (Score:5, Funny)
Re:SETI (Score:3, Funny)
Re:SETI (Score:4, Funny)
Using legitimate programs for illegitimate means is garbage. It should not be funny to anyone for any reason.
You know, call it a hunch, but I'm betting you're probably not the guy I want to be testing out my new Holocaust joke on.
Re:SETI (Score:2)
Wrong career (Score:5, Funny)
Glieder, Fantibag, Mitglieder?
These guys shouldn't be writing code, they should be writing Harry Potter novels.
Re:Wrong career (Score:3, Informative)
Mitglieder = Members
Highest bidder? (Score:5, Funny)
Heck, that's five cents more per PC than SETI@Home pays me, and they won't eat me when I find them like the aliens will.
How does the money change hands? (Score:3, Interesting)
They can't meet because they are likley in widely separated areas.
They can't use a electronic transfer because it leaves a paper trail.
how do they move the money around?
Re:How does the money change hands? (Score:2)
even shady businesses have semi-legitimate escrow services
Re:How does the money change hands? (Score:5, Insightful)
Re:How does the money change hands? (Score:5, Informative)
Caymans are where it's at.
Re:How does the money change hands? (Score:2, Insightful)
It's not like these guys are all on their own, two kids who think they can make money. Often these groups are backed by, or associate with, traditional organized crime. That's what organized crime means... criminals helping criminals. You want to do something and get away with it? You pay your bit and get some help from others who already know how to do this.
Western Union moneygrams (Score:2)
Price Check on Aisle 5 (Score:2, Funny)
Ideal opportunity to disinfect the internet (Score:4, Insightful)
2. White-hat hack into the botnet.
3. Tell all compromised PCs to wipe their hard drives.
4. No more compromised PCs! Well... not for a while anyway!
Re:Ideal opportunity to disinfect the internet (Score:3, Interesting)
Many Bothans died . . . (Score:3, Insightful)
Bah. Big Deal!
If you run Windows, you PC will be owned at some point. (Yes, yes, I know some of you out there are perfect, and haver *never* messed up *anything* security wise) This happens to me, this happens to less computer literate people, and this happens to large organizations with IT staffs, like the U of Chicago and Allstate.
The solution is the same as always. Switch OSs.
The hotfix is the same as always. Backup data, use your restore disk. Rinse, lather, repeat.
I don't understand why zombie networks are news. The only way that they should be news is when they are used to DDOS major targets. Then, someone should be held accountable. Software manufacturers? Zombie PC owners? ISPs?
I'm not sure. But just like the guy with the TV that summoned the coast guard, (http://www.syncmag.com/article2/0,1759,1781135,0
Re:Many Bothans died . . . (Score:2)
I hate to nitpick, but it's not rinse, lather, repeat. First you lather, THEN you rinse. Repeat as desired. Maybe that's why you could never get the shine and manageability that you see in the commercials.
Re:Many Bothans died . . . (Score:2)
Well damn, that sure saves me some shampoo. Because I figured I could just skip the "repeat" step sometimes, but when I got to lathering, the only way I could get that damn shampoo out was to rinse it, and then I was back in the middle of the instructions, and the next step was lather and then I just ran out of shampoo when I got to the lather and then I had to stop but wow now I can skip just the repeat part and
Re:Many Bothans died . . . (Score:3, Insightful)
I nominate the politicians who were paid by lobbyists to write the laws to help the lawyers to convince the judges to uphold EULAs that divest companies like MIcrosoft from accepting any responsibility for selling software which allows these sorts of things to happen.
It's because they put distribution above the product. They were in it for the money more than the product quality. As a consequence they paid the lawyers to shield them from users with stolen i
Re:Many Bothans died . . . (Score:2)
That you know of.
Re:Who will bell that cat? The only way DDoS will (Score:2)
At this rate, the amount of space allocated to virus definition files will exceed that of the OS and device drivers. A hard drive will become like human DNA with more junk data than active genes.
X-Files? (Score:2, Funny)
Re:X-Files? (Score:2)
Real geeks don't drink beer. Their parents wouldn't allow such things to happen in their basement.
All I have to say... (Score:2)
As I've been saying for years: (Score:3, Insightful)
This is more work for ISP support staff, but it would dramatically reduce network traffic; I bet it'd be an even flush as far as overall cost.
Re:As I've been saying for years: (Score:3, Insightful)
Have a sign-up page. You could even make it automatic.
"You recognize X-Y-Z, and confirm that you will be held responsible in the case of abuse, and confirm that you will be responsible for your own security, yadda yadda"
Then, if abuse is detected, cut'em off, and force them to call in to get off the blacklist.
Personally, I don't really like this. Better to make OS manufacturers accountable, methinks.
If your car could be infected with a 'virus', via Bluetooth, which
Re:As I've been saying for years: (Score:2)
Have a sign-up page. You could even make it automatic.
So the latest and greatest virus can automatically open it's own ports. Yeah! No.
Personally, I don't really like this. Better to make OS manufacturers accountable, methinks.
That's great in theory, but the reality is this:
1) The government isn't going to do anything to MS or anybody else for making insecur
Re:As I've been saying for years: (Score:3, Funny)
Re:As I've been saying for years: (Score:3, Insightful)
If you want to be protected from the big bad Internet, signup with AOL. Some of us just want IP dialtone. Route the damn packets and leave us alone. I certainly don't want my ISP passing judgement on what ports they'll allow in packets that traverse their network.
Re:As I've been saying for years: (Score:3, Insightful)
Quite frankly, I don't care what some of you want. Some/most of you are on machines that try just about every available exploit against my web/email server, and chew up a significant portion of my bandwidth with spam forwarded through your roote
Re:As I've been saying for years: (Score:4, Insightful)
Re:As I've been saying for years: (Score:3, Insightful)
The Internet is used for more than web and email. Do you think that all those 'random ports' were invented just because "hey we need a new way for viruses to propagate!!!" Do you think that the Internet should be locked down
Re:As I've been saying for years: (Score:3, Insightful)
For that matter, I wouldn't either. I would call and say "Listen, I don't want to have to call you whenever I want to play with a new protocol. So you will open up every damn port for me right now, or I will terminate my account." Please note that this is assuming the ISP has a 24/7 staff on
Re:As I've been saying for years: (Score:2)
Re:As I've been saying for years: (Score:2)
many virii get their foot in the door, so to speak, with an email. once something has executed, eg opening a document or some other vbscript, or an exe, it'll pull its full payload down from the web. and that can then sit and listen on one of those standard ports.
all this will do is interfere with people who need things other than you deem "necessary", eg streaming audio, online gaming, p2p, or ANYTHING bespoke whatsoever. i don't want my ISP to treat me like an infant, es
Re:As I've been saying for years: (Score:2)
That's the other half of it: Block all incoming ports. You can make connections out, and they can make it back to you, but that's it.
all this will do is interfere with people who need things other than you deem "necessary", eg streaming audio
Re:As I've been saying for years: (Score:5, Interesting)
I would suggest using user levels.
regular customers would get level 1 or level 0. (Web and mail access, no incoming ports, etc.)
Then it would be a customer's decision to apply for a higher level. maybe pass a test, portscan, etc. sign something that gives them responsability for the services running on their box.
They could even make higher levels cheaper, as an incentive for customers to educate themselves. like level 4's get 15% off their monthly bill.
That is a terrible idea, how about... (Score:3, Insightful)
I'm sure my ISP would love it if I would say ask for ports 4662 to 4672 and 6881 to be unlocked.
I wonder what they'd think I was planning with those...and I'm sure the new knoppix iso would not be their theory.
Now after having edonkey and bittorent work,
I'll only need
5800 for VNC
21 & 22 anybody?
How about this idea, everyone has complete access privileges. The isp notices for common characte
Re:That is a terrible idea, how about... (Score:2)
And how is this easy for an ISP to implement? This would require realtime scanning on the streams coming and out of their network. My solution blocks first, askes questions later. Much easier for an ISP to impement, especially given that almost all their equipment can do this already.
And the best part is, most users wouldn't notice the difference. Those that do would
Re:As I've been saying for years: (Score:3, Interesting)
You have full access, with real IPs for all your machines, and no restrictions on running servers.
If they get any abuse reports you have 3 strikes - first and second report they'll e-mail you. Third report they'll kill your connection, and call you up to let you know what happened.
It's then up to you to fix the problem before they reconnect you.
Re:As I've been saying for years: (Score:3, Insightful)
Re:As I've been saying for years: (Score:2)
My ISP me with an IP, DNS services, routing services, and a bare wire with a signal. How about we leave it that way?
Please. Think before you spea
Re:As I've been saying for years: (Score:2)
All inbound ports 1024 are blocked on my net connetion, but I don't dare ask for an exception because they'll hit me with the no-servers clause in their t
punitive firewalls suck (Score:3, Insightful)
If you read the article, its not the ports thats the problem its
So Microsoft is telling the truth... (Score:5, Funny)
...at five cents per computer, they do have a lower TCO after all!
No, NO. (Score:2, Funny)
Re:So Microsoft is telling the truth... (Score:2)
The most unsettling thing... (Score:5, Interesting)
If you are an end user who just wants to use your computer, it may be time to look at getting a Mac. The bar for information security in the face of this level of organization is getting too tall for your average end user.
If you are in an enterprise situation and have a usage policy that allows users to use corporate equipment for personal banking on breaks, you may want to reconsider that policy.
Oftentimes, computer usage is negotiated by labor unions and you cannot simply change computer use policy out from underneath users. In this case, I wonder what the legal responsibilities of the company are to exercise due dilligence in protecting its end users?
If you haven't already done so, it's time for a lesson in defense in depth. That means IDS, IPS, Firewalls, Antivirus, Spam blockers, AV web proxies, etc. And because perimeter defense is all but a quaint memory in today's more agressive world, you may want to look at host-based firewalls and other AntiWorm systems [intrinsicsecurity.com].
Good luck. We all need it.
-Peter
Re:The most unsettling thing... (Score:2)
You just have to be "not a moron". Granted security is easier if you
a) Know what you're doing
and
b) Use the right tools...
That said you can secure a windows box so that not every little worm that gets loose can have a feast on your computing resources....
This "oh buy a Mac they're secure" bullshit is really annoying. Yes they're cool, but I'd rather have a Venice AMD64 based system anyday. They're cooler, fas
Re:The most unsettling thing... (Score:2)
People are stupid, d
You missed my point. (Score:5, Interesting)
But, does every end user need to be a damned security expert? Sorry, but the average Joe shouldn't have to know what the hell a host based firewall is, much less if it's a good one.
Sorry, cowboy, if you are looking for easy (Gentoo doesn't cut it) and reasonably secure, the Mac is a pretty good option.
Now, if you notice, the second part of my post dealt directly with defense in depth for enterprises that pay for real, professional security experts to mitigate the risks of running Windows. Windows can be managed, but it's expensive and requires more due dilligence than some other platforms that ship with a better default security posture.
Congrats on the purchase of your Venitian AMD64. When *you* get off your duff and provide support to *my* extended family's fleet of PCs at slash-rate prices, I'll list you as an alternative to buying an Apple.
Cheers!
-Peter
Re:The most unsettling thing... (Score:2)
Starting to? You haven't been paying attention. Botnets, phishing, traditional shipping scams and spam are not-even-terribly-new 'business' growth areas for organized crime 'gangs'. Many of the current attacks take a degree of sophistication and persistence not usually exhibited by your average script kiddie.
Not that it's shocking - people looking to make a buck are going to try just about anything that might work, and refine their efforts on the things
Re:The most unsettling thing... (Score:2)
-Peter
GunBound - Owns your PC (Score:2, Interesting)
They weasled my wifes login, and loaded it onto her PC. I found out why the other day, because they were having trouble installing the "upgrade".
Trouble was, my wifes login no longer has "Administrator Access". So I elevated the privs, did the upgrade, and downgrade the privs.
Gunbound don't run.
So I uninstall, and try to delete the program folder, and get Access Denied.
Long story short, even after uninstall, Gunbound left a process running on the com
Re:GunBound - Owns your PC (Score:2)
And that you cant delete the program folder: smarty, you installed an update as administrator, OF COURSE a user cant delete the files... i suggest get them off the way you got them on...
And yeah, because NOBODY would have detected a trojan that is installed by a game with >100.000 players...
Re:GunBound - Owns your PC (Score:2)
While you were looking at their site, you may have noticed the "softsynx fights hackers" news item giving a hint about the "mystery program".
And btw: they make money by selling ingame currency (something you would have found if you had really looked), and IIRC the korean equivalent isnt free of montly charge and was widely successfull 5 years ago or so)
Read: Spam (Score:2, Interesting)
Get the Facts (Score:5, Funny)
"With volume discounts and integrated tools, we can now offer "managed" remote hosts as low as 5 cents per unit."
Apparently The Register is published in the South (Score:2, Funny)
Racketeering? (Score:2, Insightful)
Security guy cynicism (Score:4, Insightful)
CA is the only product which detects ALL three of the mentioned viruses as of this posting. Which is not to say that they're making this up, but I'd be more willing to believe it if it came from the Secret Service or CERT.
Re: (Score:2)
Re:misread (Score:2)
SuperBot (Score:2)
For example, instead of Folding@Home [stanford.edu] subsidizing pharmaceutical corporate researc
Public list of malware-infected PCs needed... (Score:3, Interesting)
These PCs should be disconnected immediately by ISPs, non-complying ISPs should be blocked from major backbones.
The feasibility of building and maintaining such a list is debatable, but for most situations and kinds of malware behaviour that seem common (to me), I can think of solutions (a simple one being to buy the mentioned list on the black market...). In practice, it should not be much harder than maintaining a list of open (mail) relays, although more cooperation from ISPs (e.g. for snooping/logging malware traffic) is needed.
As a long-term solution, legislation should require ISPs to disconnect such problematic PCs immediately or be fined if damage is caused by them.
August 29th..... (Score:2)
As you all know thats the date Syknet becomes self aware and
Terminators everywhere , cats and dogs living together in harmony, armageddon
But seriously when is this supposed to happen EXACTLY ?
who WRITES this shit (Score:2)
I just don't get it, I'm serious.
Okay, now that I'm done saying that, you all can come in and tell me that I'm stupid for asking such a rediculous question and tell me that I should crawl into a hole and wait for the cleanup crew to eliminate me because i should be destroyed for asking such a question.
Re:who WRITES this shit (Score:4, Insightful)
Organized crime.
In the old days, virus authors were really just trying to see how much of a nuisance they could be. Now, however, the ability to combine stolen resources spread over a large geographical area makes it incredibly easy to do some serious crime for relatively low risk.
Try looking at it from a criminal's perspective. The resources to mount a massive attack are easy to come by; thanks to most folk's unwillingness/fear to learn anything about computer security. The police are perceived as being just as clueless as the victims with the cracked computers. The investigation has to start with the machines that were cracked, which gives the crakers more time to cover their tracks.
And this says nothing about the complexities of getting a conviction with the morass of International laws involved.
It's evil as hell, but a bit ingenious.
Oh, great. (Score:2)
Go into exile, we must.
Why aren't countermeasures more effective (Score:2)
So why aren't self-destruct (e.g. remove backdoor and patch vulnerability) instructions being sent to these botnets as fast as they are becoming established?
Rent botnets here! $0.05/machine (Score:5, Informative)
SpamForum [spamforum.biz]
SpecialHam [specialham.com]
And the new WildBiz [wldbiz.com].
WildBiz does not require registration; the other two do. Just enter the forums and look under "Proxy Lists". Typical ads:
First of all Hi to all of my seniorshooters here..
Having good collection of fresh Proxies and got DM ["Dark Mailer"
DM Latest version (Full) for $49
Fresh Proxies $50 for 500 proxies
dmandproxies@iamdns.com [mailto]
61.246.226.69:3128@TUNNEL$GOOD$20297$Australia
81.33.4.70:3128@TUNNEL$GOOD$2953$Spain
61.246.226.69:3128@TUNNEL$GOOD$20297$Australia
218.208.247.81:3128@TUNNEL$GOOD$15219$Malaysia
219.144.194.74:1080@SOCKS4$GOOD$1125$China
66.154.54.215:80@TUNNEL$GOOD$4157$United States
66.154.54.224:80@TUNNEL$GOOD$1266$United States
We provide Hourly Updated Fresh Proxy Lists, which can be used for bulk mailing
That's how you market a botnet.
Yes, these operations are addressed to wannabe spammers. But the fact that they're advertised openly indicates how weak enforcement is.
what would the mob want with a massive botnet? (Score:2)
Re:In Soviet Russia (Score:2)
Oh, this and remaming Computer to 'My Computer'
Sheesh. Talk about inferiority complex.
Here's a reason... (Score:3, Interesting)
Re:The fundamental problem (Score:2)
1. ISPs and targets of said botnets should hold the zombie lusers accountable.
2. Federal legislation requiring that OS vendors indemnify customers versus certain types of security problems.
Re:The fundamental problem (Score:3, Insightful)
Re:OS-X? (Score:2)
Re:There is a money trail. (Score:3, Funny)
Re:There is a money trail. (Score:3, Interesting)
Re:Price Wars (Score:2)
Which is really what they should be doing, in an inverse-converse way, to the media industry. "They're giving the stuff away to anyone with $15... how important can their property be?
Re:organized crime? (Score:3, Insightful)
Step 2 - explain crime to local law enforcement so they know who to arrest and what evidence to collect.
Step 3 - explain it again to DA, judge and grand jury so they know what to charge them with, if there is even a law that can be applied.
Step 4 - watch local lawyer demolish case because no-one can figure out who was injured or assign a monetary value to loss