Researchers Infiltrate and 'Pollute' Storm Botnet 261
ancientribe writes "Dark Reading reports that a group of European researchers has found a way to disrupt the massive Storm botnet by infiltrating it and injecting "polluted" content into it to disrupt communication among the bots and their controlling hosts. Other researchers have historically shied way from this controversial method because they don't "want to mess with other peoples' PCs by injecting commands," said one botnet expert quoted in the article.
It's not Really... (Score:5, Insightful)
Re: (Score:2, Insightful)
Re:It's not Really... (Score:5, Insightful)
Yeah, It's the botnet equivalent of counter-espionage. Really one for the good guys here.
Well, possibly, but I think the moral conundrum isn't about attacking the botnet itself, but about the owners of the computers the botnet is unwittingly hosted on. All this "poisoning" activity affects the zombied PCs, after all.
To use a (non-car) analogy: Germany invaded Belgium in WWII. That was morally bad. Later, the allies counter-invaded Belgium. That was morally good. But the battles involved in both invasions weren't particularly great for Belgians.
Wow, Godwin in 2 posts... (Score:5, Funny)
Re: (Score:3, Funny)
It was morally "good" -- from our perspective... (Score:5, Insightful)
Re:It's not Really... (Score:5, Insightful)
It would be far better to monitor the botnet, find the computers involved and then help them clean their computer and prevent another infection. It's not as simple or efficient in the short term, but it's more moral and more effective in the long run.
Re:It's not Really... (Score:5, Insightful)
Re:It's not Really... (Score:5, Insightful)
Re: (Score:3, Informative)
Re:It's not Really... (Score:5, Informative)
That said, many many jurisdictions in the United States have a so-called "Good Samaritan" law. This is a law that protects you from criminal charges and--depending on the state--lawsuits. For instance, the law in Texas is quite broad and protects anyone who acts in good faith from any civil damages. On the other hand, California's law is much more strict, and protects only licensed EMTs, Doctors, Nurses, etc. at the actual scene of an emergency.
Know the law in your state! http://www.cprinstructor.com/legal.htm [cprinstructor.com]
Re: (Score:2)
Re: (Score:2)
Re: (Score:2, Informative)
Re:It's not Really... (Score:5, Informative)
Re:It's not Really... (Score:4, Insightful)
That was also the line of thinking by Robbert Morris when he released "the great worm" back in 1988. We know how that turned out. There is ALWAYS some risk.
Re:It's not Really... (Score:5, Informative)
Effectively, fracturing the net into multiple pieces; not taking control o the computers and doing something.
This is not a counter-attack to the infection or anything like that. They're just jamming the comm system that the bots use. They're not actively doing anything to the bot or computer.
Re:It's not Really... (Score:5, Informative)
Actually, the paper presented at the conference
http://www.usenix.org/event/leet08/tech/full_papers/holz/holz_html/ [usenix.org]mentions that the fracturing attack does not work. The Storm botnet currently only 2 things.
1. It sends spam e-mails if it receives a file in a spam template format with another file containing a list of addresses.
2. It commits a denial-of-service attack against a host if it receives a different templated file.
What the researchers are proposing is to become a sender and to send out floods of blank files faster than the actual operators can send out their real files. As a result, the hosts are too busy downloading the 2200 phony files to get around to the 1 real one.
The time it takes for all the network nodes to get around to the real file eliminates the power of the botnet, reducing its effectiveness to that of a few machines even if it contains tens of thousands.
Re: (Score:2, Informative)
Re: (Score:2, Informative)
Re:It's not Really... (Score:5, Funny)
Re:It's not Really... (Score:5, Interesting)
Who, other than a NATO-type international task force, would have the resources to reach out to those 40k users and help them clean their machines? All you IT admins and helpdesk staff are already cringing at the thought of handling tens or hundreds of users -- can you even begin to imagine trying to explain to thousands of clueless users what's happened to their PC, and what steps to take to clean it?
Re:It's not Really... (Score:4, Interesting)
Re: (Score:3, Insightful)
Re:It's not Really... (Score:4, Insightful)
Re: (Score:2, Interesting)
Re: (Score:2)
I guess I've got my Evil bit set because if I had the know how I would send a low level format command out. The bot net would collapse, people profiting from it would stop and maybe people would start putting pressure on Microsoft to actually do something. Maybe even install a bootloader to display Apple, Ubuntu, & FreeBSD's websites.
Sure it's not nice, but if it gets people to actually take action then
Re: (Score:2)
One problem i see with this is that the proverbial grandmother, whose infected machine has slowed or stopped working altogether, then associates Apple, Ubuntu, and FreeBSD with the reason why her computer stopped working. To her, and thousands like her, their machine stopped w
Re:It's not Really... (Score:5, Funny)
Thank you for supporting Microsoft".
How's that?
Re:It's not Really... (Score:4, Funny)
Re: (Score:2)
Re: (Score:3, Informative)
By making data clearly different from executables? I mean, how about "The attachment you are trying to open is NOT a movie/picture/sound/etc. It is a program that has unlimited access to your machine."
Re: (Score:3, Funny)
The damage has already been done.
Re: (Score:2, Insightful)
Re:It's not Really... (Score:5, Insightful)
In that light, losing all their data might be just what's needed to get them to take computer security seriously. However, I'd consider it a last resort since it's a punitive action rather than a preventative action. The long-term solution is to accept that casual users are going to run their computers like this, and to come up with mechanisms which blunt or dilute the impact of compromised systems. We're already doing this with anti-virus and anti-spyware software, as well as flaming Microsoft so they fix all the security holes in Windows. But it may or may not also involve poisoning botnets.
Off the top of my head, I don't think you need to remove the botnet software. It's probably already secured the box against further infection. So all you need to do is scramble its communication and/or encryption so it doesn't/can't contact the bot master again. It could be as simple as changing one bit in an otherwise unused registry key. So "poisoning" a botnet may be much more benign than your worst case scenario.
Re: (Score:2)
I hate that excuse so much. It's no different then any excuse any a fascist uses to 'fix' a problem.
This is an OS problem, and should be fixed as such.
Re: (Score:2)
I like your argument, but I think it's based on a flawed premise. If I know my neighbor's going to take a gun and go shoot a bunch of people, so instead I shoot him first, I have done exactly what you're advising -- but I still will get charged with murder.
If they're doing things to a botnet that can modify infected computers, that's illegal, even if their intentions are good. You c
Re:It's not Really... (Score:4, Interesting)
One ugly thing malicious software can do is a "retaliation" strategy (a cooler name is welcome). If you try to destroy or render it ineffective, then it attempts to do the same to the computer that it's on. If I can't have your computer, then you can't have it either. Maybe tit for tat. So if the user stops trying to fix things, then the bot stops retaliating. This would be interesting on a collective level since the bot network might start destroying data, if it detects poisoning attempts.
Re: (Score:3, Funny)
Re: (Score:2, Funny)
Unless there's a problem with the command you send out and it completely wipes the end users hard drive and all their personal data or does something else destructive to the infected user.
And if I were a botnet author, I'd make absolutely sure that signs of such tampering would result in this (the DISABLE_ZOMBIE command in version 1.00 effects the WIPE_WHOLE_DRIVE command in update 1.01). Watch as the self-appointed saviour destroys the data (bla bla backups) on half a million computers world wide.
The road to Hell...
Re:It's not Really... (Score:5, Funny)
Also, it would give us geeks some extra income and we would have the opportunity to load Ubuntu on their machines.
Re: (Score:2, Insightful)
I would argue that it is a computer owner's moral responsibility to make sure it's not doing any harm to others.
If someone leaves their bag unattended at a train station, they should expect it to be destroyed in order to protect the public. If someone doesn't secure their PC and it becomes a hazard to others, shouldn't it be taken out too, by any means?
Re: (Score:2, Insightful)
Re: (Score:2, Insightful)
Should I not be held (somewhat) responsible if my unprotected gun is used in a crime? A computer with an internet connection has inherent risks, it's the users responsibility to secure and protect their own goods against damage, as well as malicious uses.
If your computer is damaged in an effort to mitigate a large-scale botnet causing massive infrastructure problems and costing people money, then perhaps you could at least learn something from the process.
I don't feel sympathy for their (speculated, pot
Re: (Score:3, Interesting)
What the bad guys are doing(to use your gun analogy) is breaking into your house, finding your firearm and picking its trigger lock, then loading it with their own magazine and ammo and then using it for evil. Would that be your fault? No. Now envision the same scenario except that you left your door open and the perp walked right through it
"help them clean" (Score:2)
Re: (Score:2, Insightful)
And in all dilemmas between morals and ethics the "right" thing to do must be weighed very carefully, there are no hard and fast rules that can be applied carte-blanche.
Re: (Score:2)
Seriously, this is no moral question. "Poisoning" Storm is nothing but a good idea.
Unless there's a problem with the command you send out and it completely wipes the end users hard drive and all their personal data or does something else destructive to the infected user.
Which the original bot might easily have done.
By the time a user is participating in a botnet, they are a lost cause. If you want to help them, fine, but do it before they get infected.
And anyone who doesn't do backups WILL lose data, it's only a question of when.
Re: (Score:2)
Just out of curiosity: how the heck do you backup a 500 GB hard disk ?
Re: (Score:2)
I do both, albeit with 320gb drives. My main system has mirrored 320s, and once a month or so when I think of it, I back those up to two 160gb drives on another system.
In another few years when my storage needs expand, the 320s will go in the backup computer, and I'll mirror a couple of 600gb drives in the main computer, and off-line backup onto the 320s.
Re: (Score:2, Insightful)
Re:It's not Really... (Score:5, Insightful)
It would also be prohibitively complex and expensive. The idea that morality obligates us to do things that are wildly unlikely to work is questionable.
Consider "help them clean their computer and prevent another infection" for what it REALLY means. That can be anything from a complete reinstall of the OS and all apps to replacing the computer with a more secure (and securED) OS because the original machine isn't suitable. There is no reasonable guarantee afterwards that the machine won't get 0wn3 again by the same or a new threat.
Re: (Score:3, Insightful)
Re: (Score:2, Informative)
Re: (Score:2, Interesting)
I do agree that the system of moderating on slashdot is HIGHLY overused by those who use them for their opinions. I've been guilty of this at times too, though I try not to.
Maybe we do need a "+1 I agree, good thinking!" and a "-1 I disagree, that's stupid!" that count as a different class of points. Dunno.
Re:It's not Really... (Score:5, Insightful)
There is no question that biased moderations occur - this is a large part of why meta-moderation is important - it is a way to "moderate the moderations."
Certainly I am sure that even when people are being responsible that personal opinions can come into play. I am sure we all may have made blunders in this way before.
"INSIGHTFUL" is supposed to mean exactly that, that the comment is insightful, interesting is supposed to mean interesting, etc.
If people are truly abusive as a pattern, the meta moderation system should catch them. Labelling comments as "Agree" or "Disagree" has no relative value because such comments are so subjective and (other than turning an issue into a popularity contest) doesn't serve the community but providing useful feedback that can be used to determine who is elligable to moderate, etc.
Re:It's not Really... (Score:5, Insightful)
The real moderation bias which is a cause for concern is modding with negative mods as a substitute for "disagree". That's bullshit, and there's no excuse for it.
Re: (Score:3, Interesting)
Informative means providing information. In the context of Slashdot, it should be information pertaining to the topic. This is not highly subjective, until you start talking about tangents.
Interesting is highly subjective. What's interesting to one person may be flat out boring to another. It's probably a bad moderation, but it's always going to be biased.
Insightful is somewhere between the two. Realistically, it ought to be reserved for times when a poster comes up wi
Re: (Score:3, Insightful)
While I think that poisoning Storm is a gray area, I don't think that these researchers are going to be able to lead the charge to clean up end-users PCs.
Re: (Score:2)
Re:It's not Really... (Score:4, Insightful)
It is more of a legal/tehcnical question. Are you legally allowed to do this? And the major problem for researchers is that they have no cloak of anonymity like the bad guys do: they are easily linked/traced to all their actions by the mere fact that they publish their work and share their results. If anything goes wrong, or even if an overzealous user just wants to sue/go to court for the sake of suing, then the researchers are SOL.
It IS a gray area, even if you are morally correct.
Re: (Score:2)
Re: (Score:2)
Think of the other Strormbot researchers they've potentially messed up ... this could be an ethical problem if they're preventing other people from working on the worm. ;-)
Fair Play (Score:4, Interesting)
Add free article. (Score:2, Informative)
Who is liable in the event of retaliation? (Score:3, Interesting)
Are the researchers liable since they technically issued the offending command while logged in as a remote user without the owner's permission?
Re:Who is liable in the event of retaliation? (Score:5, Informative)
Re: (Score:3, Insightful)
Inject a vaccine? (Score:2)
Cheers,
Re: (Score:2)
Actually Reading the Article (Score:4, Informative)
Re: (Score:2)
That's the question.
Armageddon (Score:3, Insightful)
Seriously I'm personally excited by the fact that this essentially seems to offer a great draw to people with security skills to try being offensive where most of their efforts would be used defensively before.
Public Key Cryptography and Message Signing. (Score:5, Insightful)
I predict that the botnet authors will respond with the following counter-measures:
1) Command messages sent to the botnet by the operator will employ public key cryptography and message signing so that bots can determine real commands from headquarters (i.e. the bot net operator) from fake ones.
2) The bots themselves will use encryption to communicate amongst themselves and employ secret handshakes once the encrypted channel has been established to detect imposters. It would not be difficult to arrange for the botnet to automatically coordinate and begin punative attacks against hosts which attempt to inject false commands into the botnet.
Re: (Score:3, Informative)
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:3, Funny)
Re: (Score:3, Informative)
It's honestly a clever way to pull it off, though it does open the doo
Re: (Score:2)
As in, they mess with the encryption key so that any data that comes in from the controllers or other bots will be reported as bogus due to the controller/bot keys not matching.
This is probably due to a flaw in the bot implementation which allows input data to smash the stack [wikipedia.org] and overwrite the stored public keys which are being used for cryptography operations (the session keys are presumably negotiated online with Diffie-Hellman exchange). If the bot authors patch this vulnerability allowing key overwrites then the cryptography approach would still be sound.
Re: (Score:3, Interesting)
The encryption itself will only be partly effective, since the bot needs to have the decryption key available, it would simply be a matter of analysis to locate the key. This would allow researchers to intercept messages headed to the bots.
Messages to the Command and Control will still be protected if public-key crypto is used.
The signatures will not be able to be faked, so your approach is correct in that it would prevent the researchers from injecting comman
Re: (Score:3, Interesting)
it would simply be a matter of analysis to locate the key.
Allow me to be more clear: the key stored in the bot code would be the public key of the botnet operator so even if the researches found it it would not help them to sign false messages. For that they would need the private key which, of course, would be retained by the botnet operator and never distributed. If the correct signature cannot be forged without the private key then the command messages would be safe, even if analysis recovered the public key from the bot binary.
Messages to the Command and Control will still be protected if public-key crypto is used...The signatures will not be able to be faked, so your approach is correct in that it would prevent the researchers from injecting commands.
Right and right again. I should
We must destroy the net (Score:2)
when you are fighting people (Score:5, Insightful)
the danger of course, is not to become what you fight by doing that
so you slightly bend the rules, all the time, without making the sort of flat out trangression of major moral issues that constitutes what criminals do
but you will still get flak from people who expect moral certitude from those who fight criminals, and criticize you like no tomorrow, all the while completely ignoring and not criticizing the criminals themselves
Re: (Score:2)
"scrupulously conforming to morals and ethics hampers your ability to fight"
Yes, like needing warrants, or seeing that the innocent people you arrest have an 'accident'.
Innocent until proven guilty, and all that pesky stuff, really who needs it~
Reaction to this paper? (Score:3, Insightful)
Plus, if you read their published work, they readily admit that they are always one step behind the worm, and have to react whenever the attacker changes his tactics. The work mentions that "the attacker can easily change [a function of the Stormnet communication technique]... and then we need to analyze [our] binary again."
Criminals usually work faster than the good guys because they have more to lose.
The terminology is confused (Score:5, Insightful)
Re: (Score:3, Funny)
There is a program running on their computer.
You also assume they don't want it there.
How active is storm currently? (Score:3, Interesting)
However, there hasn't been as much spam from Mr. Kuvayev - either in my own boxes, or mentioned recently on line. This leaves me to wonder if perhaps he isn't utilizing it as much as he used to?
While certainly the botnet has been used for more than just spam propagation, and Kuvayev has sent spam to a lot more people that just me, I still can't help but wonder if it either isn't as large or as active as it once was.
Re: (Score:3, Interesting)
So it's great that they came up with this but too bad it's pointless, at least for Storm. However, I'm sure they'll continue patting themselves on the back for fixing something th
Wouldn't surprise me. (Score:2)
If I was doing illegal botnets, I'd make a cool billion dollars or so, then retire to a tropical island.
Re: (Score:2)
Interesting idea, with an interesting correlation to Kuvayev. I've seen him alternate between claiming his residence to be in either Finland or Tahiti. Perhaps he's entered a state of semi-retirement?
Fools! (Score:4, Funny)
This was already covered, and more... (Score:2)
Go look through the articles... some of them rock. The technical knowledge of these guys, how they dismantled storm, etc is amazing.
Ain't their job. (Score:2)
It's a real shame that this is being done by researchers and not security forces. The researchers are correct, it ain't their job. It should be done by people who we have already given the authority to trespass with cause.
Not going to happen. Sadly. I live in a place where violent crime is incredibly rare, but property crime is common. The most valuable
Polluting? (Score:2)
Maybe that borg^H^Htnet have some sort of "sleep" command to make it inactive in most part.
Why on earth garbage? Why not... (Score:2)
> net send <logged in username> "your machine is infected with the Storm rootkit, go here for the fix URL:..."
and scare them into fixing it! Just a little tough love and education is what is needed, not hosing up their machine. Anything that has the potential to damage the machine is a very bad idea, but the owner really needs to know its hacked, and then how to fix it.
Re: (Score:3, Insightful)
Re:SPY v. (nothing) (Score:4, Insightful)
bad bad idea
I'd love to be required to have antivirus software on my linux/FreeBSD/Solaris machines. If you don't have a locked down box those systems can be just as bad as a botnet windows machine.
Or requiring comcast to have a rootkit on every machine you have to ensure that it's not infected. Sony computers would love that!
Re: (Score:3, Insightful)