Feeds

Rise of the botnets

Honeynet Project lifts the lid on zombie networks

  • alert
  • submit to reddit

The essential guide to IT transformation

Botnets - networks of compromised PCs - launched 226 distributed denial of service (DDoS) attacks on 99 different targets in a three-month period from November 2004 to January 2005, according to a study from The Honeynet Project.

The report, Know your Enemy: Tracking Botnets, estimates a population of approximately one million infected hosts is under the control of computer crackers. The findings come from monitoring a network of PCs deliberately left open to attack in order to track and study in detail the actions of attackers and the tools they use. The project, run by the German Honeynet Project, also monitored IRC channels used to control botnets. What emerged from the study is the most detailed technical description of the modus-operandi of botnets we've seen to date.

The project tracked more than 100 active botnets, some with up to 50,000 compromised "zombie" machines. It saw 226,585 unique IP addresses joining at least one of the monitored channels which represent only a small proportion of overall botnets activity. Based on these figures The Honeynet Project conservatively estimates that "more then one million hosts are compromised and can be controlled by malicious attackers,"

Botnets are being used for a variety of nefarious criminal or malicious purposes including: distributing spam, mounting distributed denial of service attacks, sniffing network traffic for unencrypted passwords, key logging, installing spyware and click fraud targeting Google's AdWords program. The study also details the most common zombie agents used in the creation of botnets such as Agobot (AKA Phatbot), SDBot and various mIRC-based bots.

"Our research shows that some attackers are highly skilled and organized, potentially belonging to well-organized crime structures," the report concludes. "Leveraging the power of several thousand bots, it is viable to take down almost any website or network instantly. Even in unskilled hands, it should be obvious that botnets are a loaded and powerful weapon." ®

Related stories

DNS cache poisoning bugs hits Symantec shops
Send-Safe spam tool gang evicted by MCI
Botnets strangle Google Adwords campaigns
Heise.de under DDoS attack
Scot in court on DDoS charges
VXers creating 150 zombie programs a week
Botnet used to boost online gaming scores

Next gen security for virtualised datacentres

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?