New Shodan Tool Tracks Down Botnet Command-And-Control Servers (thestack.com) 11
An anonymous reader quotes The Stack:
Search engine Shodan has announced a tool to help businesses hunt out and block traffic from malware command-and-control servers. The new Malware Hunter service, which has been designed in a collaborative project with threat intelligence company Recorded Future, continuously scans the internet to locate control panels for different remote access Trojans, including Gh0st RAT, Dark Comet, njRAT, XtremeRAT, Net Bus and Poison Ivy. The internet crawler identifies botnet C2 servers by connecting to public IP addresses and sending traffic which mimics that of an infected device. If the receiver computer sends back a response, that server is flagged.
The article reports that Shodan's Malware Hunter tool has already traced over 5,700 RAT servers -- more than 4,000 of them based in the United States.
The article reports that Shodan's Malware Hunter tool has already traced over 5,700 RAT servers -- more than 4,000 of them based in the United States.
The question is... (Score:2)
The question is probably unanswerable, but I would be curious to know what fraction of all of the C2 servers have they identified.
Re:The question is... (Score:5, Interesting)
The real question is, now that these C2 servers have been identified - and will continue to be identified when they get relocated to alternative providers - how reactive the ISPs that are hosting them are going to be in getting them shut down. I suspect several of the "usual suspects" amongst the C2 hosting ISPs on the Shodan list are going to fail quite badly in that regard, but that's all for the good; if this results in concentrating more of the C2 servers into a smaller number of "bullet proof" hosting providers, then the case for a responsible ISP simply adding the relevant AS to a DROP list becomes *sooo* much easier to justify.
Re: (Score:2)
prison != jail
Hopefully, none of them go to prison without due process.
Maybe you should read more before you start getting inflammatory
That's the pot calling the kettle black.
Re: Just two questions (Score:3)
Which highlights that the goal should be to identify the control server operators and take them out permanently.
Easier Way to Find Them (Score:2)
Probably is a easier way to find bot servers, simply raid NSA and CIA computer centres. They have been exposed for the games they are playing.