Feeds

I Was A Teenage Bot Master

The Confessions of SoBe Owns

SANS - Survey on application security programs

The son of a landscaper father and a mother who taught middle school, SoBe came of age in Boca Raton, an affluent town about an hour's drive North of Miami made up mostly of older retirees. After quitting school, he spent much of his days coding in C++ and frequenting IRC channels related to hacking. It was in a now-defunct channel called #bottalk that he met Ancheta, who typically went under the moniker Resilient.

"He stood out from all the other people basically because he didnt bullshit people," SoBe recalled. "Most people you meet in the bot scene will claim they have xxxxx amount of bots but they dont and they lie about everything."

Unlike the others, Resilient had proof that he had sizable botnets under his control.

"You can't really lie about that when you take screenshots proving you have well over 70k," SoBe said. "It's hard to fake hundreds of exploit messages with unique IP addresses and a picture of him in a channel with 60,000 users."

SoBe was also drawn to Ancheta's social flair as demonstrated, among other things, by a MySpace profile that was packed with photos of his souped-up BMW and passel of photogenic friends. "He isnt like your average computer nerd," SoBe explained. "He actually goes outside, has fun, partys."

Not all their hacking was business related. The two were part of a posse that defaced websites by compromising, or "rooting," vulnerable servers. They took great pride in their mischievous exploits, which they documented with graffiti they left behind. The screenshot below, from the recently closed Zone-h.org website, documented the digital scribbling they left one site.

Screenshot of graffiti left by SoBe, Resilient and others

SoBe and Resilient were here

But by and large, SoBe and Ancheta's relationship was about making money. When they first met, Ancheta's business model was in the midst of a major overhaul. He had been renting out his bots in a channel titled #botz4sale, but despite brisk demand, he hadn't been able to bring in the kind of money he hoped for. (According to fees tracked by prosecutors, it was less than $3,000, although the true fee was probably higher.)

Ancheta recruited SoBe to help him launch a new scheme installing adware on Ancheta's fleet of compromised machines and using them to generate pay-for-click affiliate fees from companies such as Gamma Entertainment, which ran a program called GammaCash; and CDT, which offered a program called LOUDcash. The new revenue model was an instant success.

"It's easy like slicing cheese," Ancheta typed, to which SoBe responded: "I just hope this [LOUDcash] stuff lasts a while so I don't have to get a job right away." In about a year, investigators tracked more than $58,000 in revenue from the scheme.

Next page: That Unstoppable Feeling

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Arts and crafts store Michaels says 3 million credit cards exposed in breach
Meanwhile, Target investigators prepare for long process in nabbing hackers
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.