Forum Moderators: open

Message Too Old, No Replies

DIY Botnet Kit

It gets worse!

         

dstiles

8:30 pm on Sep 22, 2011 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



A report on the zdnet security blog today makes reference to a DIY Botnet Kit "in the wild" for about 10 Euros. The report originated with GData.

Apart from potential for more spam, the kit also supports SOCKS, which gives it the capability of hitting web sites. Features include (from the zdnet report)...

# Possibility to carry out DDoS attacks
# SOCKS; bot owner can use victim’s pc as proxy
# Firefox password stealer; stealing passwords saved in Firefox database
# Remote execution of any file
# Pidgin password stealer; stealing passwords from the instant messenger Pidgin

As if we hadn't enough to contend with. Now even the most impecunious wannabe hacker can get in on the act.

If this link is allowed...

[zdnet.com...]

incrediBILL

2:33 pm on Sep 24, 2011 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



Why pay for the kit? There are free ones available ;)

I downloaded a few 'kits' that the botnets attempted to upload once just to see what in the heck were in the files they try to inject on the server. Some were just simple phone home ping files that sent your location back to the botnet for the hacker to review later. Other scripts they attempted to upload were basic shells to give them as much control over your site/server on the first attempt. Then, every now and then, I found a C&C script upload attempt, those were interesting to say the least.

Fun stuff to look at, easy stuff to stop and thwart once you know what to look for too.

Which always makes me wonder why botnets are so prolific and these security companies can't either stop or significantly slow down the spread of this crap.

dstiles

4:58 pm on Sep 24, 2011 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



Ah, if you advertise something for a low price a lot of people will buy. Something for free might not work. :)

I have always thought it should be easy to kill these networks, especially at the beginning. It's not as if a lot of these people and their networks are unknown. There seems to be far more pressure by financial institutions, for example, on their customers than there ever has been on fixing the original problem.

From the same blog on a slightly different (though similar) topic:

"According to abuse.ch’s Zeus tracker, there are about 220 command and control servers online at any given time. The site monitors the about 700 servers hosting the botnet."

So why haven't they killed them? For example, get the ISPs to disconnect their customers - dynamic, static or server - until they fix the problem.

On the other hand, a lot of companies are making a lot of money from "security".