|
|
樓主 |
發表於 2013-6-9 16:46:32
|
顯示全部樓層
Types of attacks
In distributed denial-of-service attacks, multiple systems submit as many requests as possible to a single Internet computer or service, overloading it and preventing it from servicing legitimate requests. An example is an attack on a victim's phone number. The victim is bombarded with phone calls by the bots, attempting to connect to the Internet.
Adware advertises a commercial offering actively and without the user's permission or awareness, for example by replacing banner ads on web pages with those of another advertiser.
Spyware is software which sends information to its creators about a user's activities – typically passwords, credit card numbers and other information that can be sold on the black market. Compromised machines that are located within a corporate network can be worth more to the bot herder, as they can often gain access to confidential corporate information. Several targeted attacks on large corporations aimed to steal sensitive information, such as the Aurora botnet.[8]
E-mail spam are e-mail messages disguised as messages from people, but are either advertising, annoying, or malicious.
Click fraud occurs when the user's computer visits websites without the user's awareness to create false web traffic for personal or commercial gain.
Fast flux is a DNS technique used by botnets to hide phishing and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies.
Brute-forcing remote machines services such as FTP, SMTP and SSH.
Worms. The botnet focuses on recruiting other hosts.
Scareware is software that is marketed by creating fear in users. Once installed, it can install malware and recruit the host into a botnet. For example users can be induced to buy a rogue anti-virus to regain access to their computer.[9]
Exploiting systems by observing users playing online games such as poker and see the players' cards.[10]
Countermeasures
The geographic dispersal of botnets means that each recruit must be individually identified/corralled/repaired and limits the benefits of filtering. Some botnets use free DNS hosting services such as DynDns.org, No-IP.com, and Afraid.org to point a subdomain towards an IRC server that harbors the bots. While these free DNS services do not themselves host attacks, they provide reference points (often hard-coded into the botnet executable). Removing such services can cripple an entire botnet. Some botnets implement custom versions of well-known protocols. The implementation differences can be used for detection of botnets. For example, Mega-D features a slightly modified SMTP protocol implementation for testing spam capability. Bringing down the Mega-D's SMTP server disables the entire pool of bots that rely upon the same SMTP server.[11]
The botnet server structure mentioned above has inherent vulnerabilities and problems. For example, finding one server with one botnet channel can often reveal the other servers, as well as their bots. A botnet server structure that lacks redundancy is vulnerable to at least the temporary disconnection of that server. However, recent IRC server software includes features to mask other connected servers and bots, eliminating that approach.
Security companies such as Afferent Security Labs, Symantec, Trend Micro, FireEye, Umbra Data and Damballa have announced offerings to counter botnets. Norton AntiBot was aimed at consumers, but most target enterprises and/or ISPs. Host-based techniques use heuristics to identify bot behavior that has bypassed conventional anti-virus software. Network-based approaches tend to use the techniques described above; shutting down C&C servers, nullrouting DNS entries, or completely shutting down IRC servers.
Some newer botnets are almost entirely P2P, with command-and-control embedded into the botnet rather than relying on C&C servers, thus avoiding any single point of failure. Commanders can be identified just through secure keys and all data except the binary itself can be encrypted. For example, a spyware program may encrypt all suspected passwords with a public key hard coded or distributed with the bot software. Only with the private key (which is known only by the commander) can the data captured by the bot be read.
Some botnets are capable of detecting and reacting to attempts to figure out how they work. A large botnet that learns it is being studied can even attack those studying it.
Researchers at Sandia National Laboratories are analyzing botnets behavior by simultaneously running one million Linux kernels as virtual machines on a 4,480-node high-performance computer cluster.[12]
Historical list of botnets
Date created Date dismantled Name Estimated no. of bots Spam capacity Aliases
2009 (May) 2010-Oct (partial) BredoLab 30,000,000[13] 3.6 billion/day Oficla
2008 (around) 2009-Dec Mariposa 12,000,000[14] ?
2008 (November) Conficker 10,500,000+[15] 10 billion/day DownUp, DownAndUp, DownAdUp, Kido
2010 (around) TDL4 4,500,000[16] ? TDSS, Alureon
? Zeus 3,600,000 (US only)[17] n/a Zbot, PRG, Wsnpoem, Gorhax, Kneber
2007 (Around) Cutwail 1,500,000[18] 74 billion/day Pandex, Mutant (related to: Wigon, Pushdo)
2008 (Around) Sality 1,000,000[19] ? Sector, Kuku
2009 (Around) 2012-07-19 Grum 560,000[20] 39.9 billion/day Tedroo
? Mega-D 509,000[21] 10 billion/day Ozdok
? Kraken 495,000[22] 9 billion/day Kracken
2007 (March) 2008 (November) Srizbi 450,000[23] 60 billion/day Cbeplay, Exchanger
? Lethic 260,000[24] 2 billion/day none
2004 (Early) Bagle 230,000[24] 5.7 billion/day Beagle, Mitglieder, Lodeight
? Bobax 185,000[24] 9 billion/day Bobic, Oderoor, Cotmonger, Hacktool.Spammer, Kraken
? Torpig 180,000[25] n/a Sinowal, Anserin
? Storm 160,000[26] 3 billion/day Nuwar, Peacomm, Zhelatin
2006 (Around) 2011 (March) Rustock 150,000[27] 30 billion/day RKRustok, Costrat
? Donbot 125,000[28] 0.8 billion/day Buzus, Bachsoy
2012 (Around) Chameleon 120,000 [29] n/a None
2008 (November) 2010 (March) Waledac 80,000[30] 1.5 billion/day Waled, Waledpak
? Maazben 50,000[24] 0.5 billion/day None
? Onewordsub 40,000[31] 1.8 billion/day ?
? Gheg 30,000[24] 0.24 billion/day Tofsee, Mondera
? ?? 20,000[31] 5 billion/day Loosky, Locksky
? Wopla 20,000[31] 0.6 billion/day Pokier, Slogger, Cryptic
2008 (Around) Asprox 15,000[32] ? Danmec, Hydraflux
Spamthru 12,000[31] 0.35 billion/day Spam-DComServ, Covesmer, Xmiler
2010 (January) LowSec 11,000+[24] 0.5 billion/day LowSecurity, FreeMoney, Ring0.Tools
? Xarvester 10,000[24] 0.15 billion/day Rlsloup, Pixoliz
2009 (August) Festi ? 2.25 billion/day Spamnost
2008 (Around) Gumblar ? ? None
2007 Akbot 1,300,000[33] ? None
2010 (Several: 2011, 2012) Kelihos 300,000+ 4 billion/day Hlux
Researchers at the University of California, Santa Barbara took control of a botnet that was six times smaller than expected. In some countries, it is common that users change their IP address a few times in one day. Estimating the size of the botnet by the number of IP addresses is often used by researchers, possibly leading to inaccurate assessments.[34]
All botnets listed here affect only Microsoft Windows systems.
|
|