Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Botnet Security

A Mercenary Approach To Botnets 34

CowboyRobot writes "The incentives are high for many businesses and government agencies to not be too heavy handed in combating the global botnet pandemic. There's money to be had and, with each passing day, more interesting ways are being uncovered in how to package the data, and how to employ it. It used to be that the worlds of bug hunters and malware analysts were separate and far between. In the last couple of years the ability to analyze malware samples and identify exploitable vulnerabilities in them has become very important. Given that some botnets have a bigger pool of victims than many commercial software vendors have licensed customers, the value of an exploit that grants reliable remote control of a popular malware agent is rising in value. In many ways, botnets have become a golden goose to those charged with gathering intelligence on the populations of foreign entities. The bulk of the victim's data is useful for mapping populations, communication profiles, and as egress points for counter intelligence exercises. Then, given how many botnet victims there are, the probability that a few 'interesting' computers will have succumbed along the way is similarly high — providing direct insight in to a pool of high value targets."
This discussion has been archived. No new comments can be posted.

A Mercenary Approach To Botnets

Comments Filter:
  • Who needs privacy? (Score:5, Insightful)

    by DavidClarkeHR ( 2769805 ) <david.clarke@hrgenera l i s> on Friday November 29, 2013 @07:16PM (#45558241)
    Great. Slashdot has been subverted by the NSA ... again.

    This time they're trying to push their propaganda on us. "Oh yes, botnets are bad, but oh my, aren't they neat?".
    • People have told you how bad botnets are but those people are bad, mmmkay? And if you think botnets are bad, then you're bad, because botnet aren't bad, mmmkay? mmmkay? mmmkay!

      • People have told you how bad botnets are but those people are bad, mmmkay?

        Them NSA are like bank robbers.

        They rob away the privacy of HUNDREDS OF MILLIONS OF PEOPLE without even blinking an eye.

        Them botnet operators ? They are like safe crackers.

        Safe crackers get to crack safes no matter if they are inside the bank vaults or inside somebody's bedroom.

        They don't really need bank robbers.

        But on the other hand, bank robbers doing a heist may need safe crackers to crack open the vault.

        Neither of them are goodie two shoes. but the robbers need the safe crackers more than the other wa

    • by fuzzyfuzzyfungus ( 1223518 ) on Friday November 29, 2013 @07:42PM (#45558371) Journal
      It's a trifle hard to tell (which is itself a bad sign) whether this is an apologist and/or geek merc, gleefully discussing the exciting opportunities. or a dissident pointing out the absurdly dangerous situation created by a perverse inventive for 'security' entities to tolerate, or even promote, widespread insecurity...

      I don't doubt that there are people who take the former stance; but I'd like to stick up for the latter, and would argue that encouraging insecurity is a hubristic and ultimately self-defeating strategy unless you are the cheap, low-tech adversary, rather than the expensive first-world spook shop with the big, rich, tech-dependent economy behind it.

      Do spook nerds get off on how much of other people's email they can read? I don't doubt it. Are our spook nerds sure that they are so much better than everybody else's spook nerds that they can compensate for the fact that some people (like, oh, the ones they ostensibly protect...) are far more heavily exposed to the internet, and to IT system vulnerabilities in their personal, professional, and financial activities than are less heavily wired countries; but there are few to no countries so poor that they can't field at least a few modestly competent surveillance geeks.

      Why would you knowingly continue a game that everybody can play; but where only some people, you among them, have a significant stake on the table?
      • So, you just discovered Poe's Law? Bully for you!
      • by flyneye ( 84093 )

        I'm with you, no need to continue to promote a bad thing.
        However, I do think those participating willfully in the botnet business, should be made to REPAY losses. Every single cent. If this exceeds their value, the state should extract it in trade for work done to roadways and ditches until every last cent is repaid or the bot supporter dies.
        Let's hear it for chaingangs! Tired of being stuck in traffic, watching a dozen bosses regulate the activities of one or two people actually working? Fire 'em and put i

    • by Jah-Wren Ryel ( 80510 ) on Friday November 29, 2013 @08:05PM (#45558443)

      This time they're trying to push their propaganda on us. "Oh yes, botnets are bad, but oh my, aren't they neat?".

      Oh come on, it doesn't read like that at all. All it does is explain why the guys who are supposed to be fighting these things now have incentive to do a really bad job of fighting them. Much in the same way that NSA perverted their own mission statement by weakening crypto standards used by the US government so that they could snoop on anyone using those same crypto standards.

      • by Anonymous Coward

        Guess you missed the part mentioning "foreign entities"? That can come from only one country, the same country whose people used to believe that all men are created equal [] but over the years through the propaganda machine they've come to believe that "foreigners" should not be treated the same as "citizens."

        • by flyneye ( 84093 )

          You really need to look up legal definitions of things like ; men, monsters, citizens, people, then come back and repost your sentiments
          All men may be born equal, but vary in value from a burden to a prize, by their education, accomplishments and disposition. Rather than deport the valueless and burdensome, it is best to deny access to begin with. Nobody said" Give us your poor, we'll take care of them for you and they'll never have to work again, why, they can come here and we'll give them a Cadillac and l

  • Is that I just noticed that CowboyNeal has been replaced by a Robot.

  • by Anonymous Coward

    When i come across a botnet, i just tend to shut the whole thing down and collect any bitcoin there is to be had.
    Lately many warez release posted on NNTP are packaged with a malware-ish bitcoin miner that connects to a remote pool.
    Those privates pools are vulnerable more often than not in some way.

    It's always enjoyable to start a new game with a bonus amount of PO :)

  • by wbr1 ( 2538558 ) on Friday November 29, 2013 @08:32PM (#45558541)
    It is a real shame criminals broke your door in and stole some stuff. However, we recommend leaving your door broken, as it allows us (the good guys, just trust us), to look around and make sure everything is oka and keep an aye on the criminals activity.
  • "combating the global botnet pandemic"
    I am responsible for the well-being of close to a hundred servers and run several computers on my home net. Have been for over a decade and I am yet to see one becoming a bot. Hyperbole much?
    • There's apparently a very large number of machines where people don't pay very much attention to their well being and such things have sunk into a malware swamp. That's where most of that vast supply of spam is coming from. I'd say the "hyperbole" is because the number of infected machines is far beyond the dreams of bad SF from a decade or so back.
  • by Gordo_1 ( 256312 ) on Friday November 29, 2013 @11:46PM (#45559213)

    between so called 'legitimate software' and botnets these days anyway?

    Each is used to collect data that can be analyzed for profit in various ways. Legitimate software, you might argue, provides actual value to the end-user, is not surreptitiously installed and doesn't exploit software vulnerabilities. However, if that's all it takes to be legit, then witness the gobs of commercial software (not to mention greyware) out there that fit the definition of 'legit', but in actuality provide only the thinnest veneer of value behind a EULA so broad that it allows the software vendor to pretty much do as they please across your hard drive and Internet connection.

  • Willingly allowing botnets to survive to collect data is much like a doctor with the cure letting a nasty disease to spread just to see who it infects and if anything interesting happens, and maybe loot a few corpses.
    It's not the Hippocratic Oath, rather it's more of a Hypocrite Oath.

    To those who don't know those two, the Hippocratic Oath is the one doctors take to do no harm. Actually it's a lot more complex than that, but tv writers only use soundbites at best.

Given its constituency, the only thing I expect to be "open" about [the Open Software Foundation] is its mouth. -- John Gilmore