Feeds

Botnets claim 7-fold increase in victims

Are we winning the cybercrime war yet?

Website security in corporate America

Botnets used in banking credential theft and other criminal enterprises made huge gains in 2010, claiming more than seven times as many victims as the previous year, according to a report issued by a security firm that follows the large networks of infected machines.

The dramatic increase was fueled by improvements in DIY botnet construction kits, which allowed internet-based fraudsters to construct new networks that quickly gained traction, the report from Damballa said. As a result, six of the 10 biggest botnets of 2010 weren't in existence the previous year. New infection technology that targets a hard drive's targets a hard drive's master boot record and changes the machine's boot options also played role.

“Throughout the year, the Top 10 largest botnets increased their total share of all bot infected victims,” the report (PDF) states. “At the beginning of the year approximately 22% of observed botnet victims were infected with malware attributed to just ten botnet operators. By the end of the year, this proportion had grown to nearly 57% - more than doubling their share of global botnet victims.”

In the run-up to Christmas week, the total number of unique botnet victims was 654 percent higher than the same population was at the beginning of the year. The average incremental growth throughout the year was 8 percent.

In addition to the release of refurbished Zeus crimeware kit, other DIY kits available in underground forums are marketed under names such as Phoenix, Darkness, BlackEnergy, and Eleonore. The packages allow criminals to quickly build botnets without having to write the code from scratch.

Damballa's report contrasted with the findings of anther Atlanta-based security firm, Secure Works, which was recently purchased by Dell. Secure Works' Spambot Evolution 2011 said botnets that specialize in sending spam largely marked time last year, with fewer new families emerging and only incremental changes in existing ones.

Like the botnets observed by Damballa, many of the spambots described by Secure Works researcher Joe Stewart made vast improvements in concealing the infections. For instance, Rustock, the biggest spam network with an estimated 250,000 zombies, waits as long as five days after taking hold of a system before it begins sending junk messages. Rustock control servers also run a TOR exit node, “likely in an attempt to avoid disconnection by network administrations who might think the abuse is originating elsewhere,” Stewart writes. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
BitTorrent's peer-to-peer chat app Bleep goes live as public alpha
A good day for privacy as invisble.im also reveals its approach to untraceable chats
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.