Botnet on Botnet Action 187
Dausha writes "The Tech Web news site reports a story about Botnet turf wars. Botnets have been around for a while, and are increasing in severity. The latest innovation finds Bots capturing and securing host computers from other bots. Security includes installing software patches, shutting down ports, etc."
Note to Editors (Score:5, Funny)
Never let CmdrTaco come up with headlines after a night of watching girl-girl porn... the images created are... disturbing...
Re:Note to Editors (Score:5, Funny)
Re: (Score:3, Informative)
Re: (Score:2, Funny)
Re:Note to Editors (Score:5, Insightful)
Re:Note to Editors (Score:4, Insightful)
Re:Note to Editors (Score:4, Informative)
Re: (Score:2)
As for companies doing it through a botnet, why would they want a lawsuit? As for doing it through their services, several companies do offer protection tools like antivirus, firewall, etc. already.
Re: (Score:2)
That failed pretty damn hard. It was argued that it did as much damage as the worm it was trying to stop.
Re:Note to Editors (Score:5, Interesting)
When you're working for evil, you don't have to worry about collateral damage. If you cause one system out of 100 to stop working completely, or just have some incompatibility that makes it less useful to the user, you don't care. If they didn't want to be infected, they'd have better security. Propagating evil viruses, trojans and worms is easy because you can be careless and expect the rest of the world to reboot if you have a bug.
This is also why large organizations have people to test that patches don't break the necessary functionality in their supported applications. If something breaks, they have to support it, so they make sure it's not going to come back to bite them. This takes a fair amount of time, people, and all of the supported configurations to ensure that things are safe. It's a real pain in the neck (or other body part) to do a good job at this.
The most secure machine is one that is turned off, unplugged and locked in a room that has an armed security guard with standing orders to shoot everyone. That's not the computer usage model that any of the companies listed want to encourage. They want the user to be insecure to different degrees.
Re:Note to Editors (Score:4, Insightful)
Re:Note to Editors (Score:5, Interesting)
The internet is still pretty much wide open, with no single governing body. A vigilante group could operate out of any number of less-than-cooperative countries. And this vigilante group does NOT have to be 100% good or careful. These zombies exist because their owners don't know or care enough to keep their machines safe, and now they're out attacking the rest of us. I have about zero tolerance for dangerously ignorant people or their hardware when it's threatening mine.
In medical terms, these zombies would be defined as malignant cancerous cells, and botnets as tumors. And to carry the medical analogy further, the treatment is to kill the rogue cells. We don't contact them, and ask "hey, Mr. Cancerous cell, you're hurting the rest of us, would you please stop?" No, we use chemo and radiation and surgery and remove and destroy the tumors so they don't spread further.
I really don't see why a vigilante group can't send out "good-faith" efforts to patch bad machines. If those machines die as a result of a bad patch, well, perhaps its because they deserved to die. I certainly wouldn't complain if someone started actively dismantling these networks.
Re:Note to Editors (Score:5, Interesting)
Some of us try.
A while ago, I got a spam message, trying to infect me and connect me to a botnet - the software was a hacked up mIRC client with some DLL plugins. The client would automatically open a second connection, connect to a random network and channel, and proceed to spam people with virus messages on join. ("Type
After talking to the admins, we banned the owners (only certain nicknames were allowed to control the bots), and replaced them with an eggdrop that had the infected people download and install an automatic cleaner. Thousands of infected computers were cleaned overnight, and hundreds more over the next few weeks. Is it possible that the cleaner broke a machine or two in the process? Possible, but unlikely (would be most likely due to a variant of the bot). Oh well - it made the IRC servers I used a lot more useful.
Re: (Score:2)
Re: (Score:2)
Nice try, though laughably untrue.
I do love your blind faith though. So, tell me, someone emails you and says "Hey, you, your machine is in a botnet. But you should trust me, a complete stranger. Install this random fucking .exe and it'll clean you up, and you know this, because I said so."
You wouldn't do it knowingly, you'd mercilessly attack anyone who did so knowingly, so remind me what the difference is if you do it without knowledge?
Re: (Score:3, Informative)
Well, that certainly sounds like you're trying to be inflammatory, but I'll bite.
A trojan is a specific type of program that masquerades as one thing, but is in fact another. The original attack was most definately a trojan. As such, I can only assume that either a) the owner of the machine didn't know about it, and has no desire for it to continue, or b) it's a botnet owner - I don't care ab
Re: (Score:2)
Re: (Score:3, Insightful)
When you decide to be a vigilante group and dish out your style of justice for others' perceived sins, you are at best what Machiavelli describes astutely as "other than good."
I'm a sysadmin, so if I were a juror and your "other than good" tactics landed you in court, I would not in good conscience be able to vote to convict you for trying to do something about these idiots. H
Re: (Score:2)
As we both acknowledged, there is no governing body, which is why I don't think vigilantes are unjustified in their actions. In order to accomplish what you suggest, each and every ISP would have to agree to participate, or giant chunks of the in
Re: (Score:2)
I'm not opposed to people taking vigilante action on botnets, but the reality is, vigilantes are also breaking the law, and I likewise don't have any qualms about seeing them face the consequences of their actions when their homebrew fix-it app runs amok.
Re: (Score:2)
If you actually saw a sick person wandering down the street, bleeding from his eyes and coughing ebola viruses on everyone he passed,
Re: (Score:2)
And here, I was just thinking you were employed by them.
Cisco makes some decent equipment, but it is all exponentially more expensive than their competition, and surrounded by promises that I haven't seen play out in the real world at all like they do in the fluffy commercials.
Additionally, Cisco has a history of occasional boneheaded security lapses, like the backdoor with the hardcoded user name and password, or the lawsuits a few years back against the guy who demons
Re: (Score:2)
That's exactly what turning on Automatic Updates + Firewall protection + Antivirus software automatic updates is. You can still get 0wned even if you have Automatic Updates turned on, but it's better than nothing. Automatic Updates + Sunbelt Kerio Personal Firewall + AVG Anti-Virus Free Edition + a couple of spyware scan/remove apps + runni
Re: (Score:3, Funny)
Re: (Score:2)
Re: (Score:2)
But, when they are running, they might use a certain amount... JUST LIKE A BOTNET! OMG! My analogy is flawless!
Re:Note to Editors (Score:5, Insightful)
As for some hacker doing it, it's all about money, and maybe a little fame. Doing this puts you in a worse position than the airline ticket hacker. So anyone that exposes themselves to this kind of risk, does so for money. And right now, there's money to be made in cutting out the competition in terms of making your botnet bigger than theirs and less likely to be removed (users are less likely to notice just one bot).
Re:Note to Editors (Score:4, Informative)
It's illegal. Botnets constitute several levels of fraud in that they a. install software without your consent; b. steal your bandwidth to copy themselves; and c. then use your computer to commit some other crime.
c. would not be done by a "good" botnet, but a. and b. would. Even if all the hijacks came from a commercial server set up for it, a. would be violated. If you think click-through EULAs are invalid...just imagine the invalid-ness of a botnet install.
Re: (Score:2)
So what? When was the last time you heard about some botnet master getting arrested and charged with 20,000 counts of computer misuse? Oh yeah, the one prosecution there was occurred because the guy bragged on some FBI IRC channel.
These people are immune to prosecution. Let's say I have a 10,000 strong botnet and I am controlling it through my cable modem at home. You can't trace the botnet back to my cable modem, that's not how it works. You can't trace it through the IRC channel used for
Re: (Score:2, Informative)
open source anti-evil botnet (Score:2)
Re: (Score:2, Funny)
Re: (Score:2)
Microsoft already has this in place, it's called windows update, and it was a HUGE leap forward. For the rest it has to do with legality and profit motivation, i.e. it's not legal and they can't make money off of it. Symantec and Microsoft make their money selling aspirin to the headaches you're describing. Google and Yahoo would be WAY out of their realm of specialty. Personally, I wouldn't mind ISPs doing it, assuming it was very up-front about
Re: (Score:2)
We fire-up the wayback machine and visit 2003:
http://www.trendmicro.com/vinfo/virusencyclo/defa u lt5.asp?VName=WORM_NACHI.A [trendmicro.com]
Patch Download
This worm is also designed to patch systems against the RPC DCOM Buffer Overflow. It first checks for the running Windows version and then downloads a patch from Microsoft. Note, however, that this worm does not have a mechanism which checks for the required service pack needed to install the patch. Thus, on systems where the required service packs are not installed, the downloaded patch are similarly left uninstalled.
Re: (Score:2)
Re: (Score:2)
http://www.trendmicro.com/vinfo/virusencyclo/defa
I understood the intention, but the result was awful.
Amen to that!
Re: (Score:2, Funny)
What's another word for pirate treasure? (Score:3, Funny)
"Second Variety" (Score:2)
Re:Note to Editors (Score:5, Funny)
Re:Note to Editors (Score:5, Funny)
Work on the broken mod point distribution code?
So many Bender jokes. . . (Score:4, Funny)
Re:So many Bender jokes. . . (Score:4, Funny)
The other thought that came to mind was "Autobots, attack!", but that's just me...
Funny 404 (Score:4, Funny)
"Botnet on Botnet Action" (Score:3, Funny)
I can see it now... (Score:5, Funny)
"We are better with patches", says GlobalBot international server.
InterSearchBot united server sneers, "PATCHES!?... WE DON' NEED NO STINKING PATCHES!"
So Possibly... (Score:4, Insightful)
Re: (Score:2)
Well you can certainly find their clients. They are the ones that are constantly hitting your web server with POST commands with no preceding GET, have strange referrers, or stupid browser identification (AmigaOS or C64, etc).
I really wish that the residential cable ISPs would shutdown these fucking connections faster. My ban list is nearly unmanageable now, if it continue
Re:So Possibly... (Score:5, Insightful)
Re: (Score:2)
Fortunately for me, I have a Visi DSL connection and they allow servers to be run without issue. Good thing too as I top 4.5 GB of transfer on average a month for my web server alone.
Re: (Score:2)
Re: (Score:2)
It's not the evolution from amino acids to virus that worries me. It's the evolution from "swinging stone axes & clubs" to
Marching down the road of informational warfare (Score:3, Informative)
http://www.iwar.org.uk/iwar/resources/treatise-on
Quite a lot of reading, but its not too bad. Seems like all that is happening is that the crooks are catching up with the research faster than the commercial people are.
The fat years are over (Score:5, Interesting)
So the maximum amount of machines to have is pretty much reached. Now the battle for the precious dimwits started. Well, it started some time ago, but we now get a lot of bot malware that actually tries to kick out the competition.
What for, one may ask. Why the overhead? I mean, what's wrong with 2 competing botnetters controlling a computer?
Bandwidth. You can only pump so much spam out of a machine with a given bandwidth. If two try that at the same time, they have to share. And sharing is not really a trait of a botnetter.
So, let the games for the herd begin. If anyone's looking for me, I'm in the lobby getting popcorn.
Re:The fat years are over (Score:5, Insightful)
When it comes down to botnets being commissioned for Spam and DDoS attacks, the one with the most machines gets the highest bid, and the difference between that bid and the second best is likely directly related to how many computers make up the difference.
There's a bit of an evolutionary war that's continuing. It's not enough to get your bot client installed. It's facing selection pressure from smarter users, better anti-virus/rootkit detection, firewalls making it harder to propagate, and more aggressive opponent bots.
Sounds very similar to nature's natural selection.
Re: (Score:2)
Re:The fat years are over (Score:4, Insightful)
So if there is an intelligent designer behind the changes in the bots in response to selective pressure, is that evolution or intelligent design?
-matthew
Re: (Score:3, Interesting)
This has been going on for years, (Score:2, Informative)
and it has nothing to do with what users do other than use Windoze.
Re: (Score:3, Interesting)
Windows is the primary target simply because it has a market share of roughly 90% in the consumer area. You may safely assume that a business server is administrated by someone who has at least half a clue and uses security features, no matter how lenient, so the consumer is the core target group for botnetters.
Since most modern attack schemes rely not on system weaknesses but on user stupidity, this would work in every environment.
What it really has to do with is users clicking on everythin
market niche is not security (Score:2)
Some of the browser exploits don't require a user to allow the wrong thing nor visit an obviously bad web site. "Good" web sites get cracked and used as distribution vectors. Exploit chains are created such that malware can get on the box as an ordinary user, then elevate to super-user status by taking advantage of a local privilege escalation vulnerability. The amount of worm traffic probing around the internet, and the continual new
Low cost + high payoff. (Score:2)
It's low cost and high payoff. A machine can scan 24/7/52. If your box is vulnerable, it WILL be found.
That's because the attacks a
Re: (Score:2)
Windows is exploited the most because Microsoft has, in the past, opted for a less secure security model so that Microsoft OS's and apps could be more "user friendly".
There isn't much of a security model. It's insecure by design. A mail client should never, ever be allowed to execute code received from the outside. It shouldn't even be an option to turn on. Self-executing zip files are a disaster. Always invoke (preferably by hand) an archive unpacker to deal with archives - why do you think unshar was invented? Fix those two problems (which have been documented for a long, long time) and you would go a long ways towards solving the security problem on Microsoft Wi
Re: (Score:2)
I'm impressed though. Really.
Re: (Score:2)
The one thing you missed is that perhaps 1% of the available machines will really be vulnerable to attacks, either through user stupidity or unpatched security flaws in some product (OS, Browser or whatnot).
This brings the numbers more in line with market share where there might be 200,000 available Mac OS machines and 4,000,000 Windows machines.
Have no faith in Corporate IT (Score:2)
You may safely assume that a business server is administrated by someone who has at least half a clue and uses security features, no matter how lenient, so the consumer is the core target group for botnetters.
Having worked for a fortune 100 company and later done Windoze upgrades for another, I can say that assumption is anything but safe. It had nothing to do with the users and everything to do with OS choice. The admins worked hard but it was all a waste of time regardless of the amount of money they
Unfortunately, this is not true (Score:3, Interesting)
Re: (Score:2)
sources (Score:2)
Re: (Score:2)
Re: (Score:3, Insightful)
You might also read Bumper crop of malware expected in 2007 [techtarget.com] which starts with Gartner's prediction that
Unfortunately this is all too real and there are n
Re: (Score:3, Interesting)
Corporate networks are largely unintersting. Few people store their personal information on their corporate machines, simply because it would be against their working contract in most places to use the machine for personal business. At best such networks would be interesting for their bandwidth, but they are usually a lot closer monitored than private machines and nets.
Yes, the stealthyness will increase. It already does. 2 years ago the average malware was an easily detectable p
Evolution (Score:5, Insightful)
Re: (Score:3)
Re:Evolution (Score:4, Informative)
I don't know from where people commenting this article got the idea that having only one "infection" that don't totally destroy the machine is a good thing, even for the machine owner. Actually, it is very worse, because if people don't notice any different behavior they will not worry to fix the machine, even if they know about the infection. And in the end of the day, they will be the first to lose their money in some scam that they inadvertently help to spread.
People don't infect machines nowadays on the evilness of their hearts, only to wreak havoc or for bragging rights, not anymore. Now they do it for profit, it is organized crime that is happening there. Have no illusions about it.
Re: (Score:2)
On this case, the class of this symbiosis has a name. Parasitism [wikipedia.org]. And gu
Oblig (Score:5, Funny)
Re: (Score:2)
A Unique Opportunity (Score:2)
All we need is to build a botnet capable of hunting down and destroying other botnets... or perhaps converting them? Kind of the Internet equivalent of an evangelist...
Re: (Score:2)
Which is basically the result of the work of people working in companies using reports, honeypots and their brains.
Re: (Score:2)
Botnet Gang Fights? (Score:5, Funny)
Re: (Score:3, Funny)
What I want to see is a Botnet that (Score:3, Interesting)
With all the punk 1eet programers out there, you would think that someone would spend time writing this instead of silly viruses.
I am tired of having pop-up advertisements beat my pop-up blocker.
How long until... (Score:2, Funny)
I keep telling people those Windows machines are dangerous. This puts them on a whole new scale.
Title should have been (Score:2)
Re: (Score:2)
"Hawt Botnet on Botnet Action". With links to robot porn.
And booze! And hookers!Re: (Score:2)
Done [smithappens.com] ;)
The new protection racket... (Score:2)
botnets evolve themselves out of business? (Score:5, Insightful)
Re: (Score:3, Informative)
Re: Forced Evolution out of business! (Score:2)
The irony would be delicious.
Re: (Score:2)
You're forgetting one thing. SouthKorean machines with devils-own XP (no SP) which CANNOT be secured until they install SP2. I wonder how the botnets will do this, and if they do, I'd like to watch
Reminds me of "open range" disputes in Wild West (Score:2)
Map? (Score:3, Interesting)
Knock knock, Neo... (Score:2)
There were worms that would target other worms.... (Score:2, Informative)
DCW (Score:2)
Re:Could someone explain the closing of ports? (Score:5, Informative)
Desktop systems are usually not as highly protected on the inside as server systems (alas) so having a firewall that blocks off server ports "Just In Case" is a good plan.
(And yes, I've left out lots of detail from this potted explanation.)
Obligatory Flamebait Elaboration (Score:2)
Except, of course, on hosts running modern versions of Windows, which is what started the first waves of botnet infection in the first place.
Microsoft has "fixed" this by installing a software firewall to block these ports, but they're still all open. Every Windows-running desktop on the planet (with the exception of the remaining 9x boxes) is essentially running itself as a server.
As to why I