Risk
8/3/2010
05:36 PM
50%
50%

Building Botnets For Fun And Profit

Creating a botnet business can be lucrative -- and isn't as hard as you might think, Black Hat speaker says

LAS VEGAS, NEVADA -- Black Hat USA 2010 -- If you're thinking about a life of cybercrime, then building a botnet might be the best place to start, a security researcher said here last week.

Click here for more of Dark Reading's Black Hat articles.

Gunter Ollmann, vice president of research at Damballa, gave a talk on the business of building botnets, aptly titled, "Becoming The Six Million-Dollar Man." The presentation was a step-by-step description of the technical and business processes required to become a botnet operator.

"Building botnets is not as scary or difficult as you might think," Ollmann said. "You don't need to be a hard-core criminal. There are tools, guides, vendors, and sponsors readily available. It's a business just like any other -- just don't get caught."

Like any business, botnet operations usually start with a business plan, Ollmann said. Many operators begin by targeting a specific group of victims or data sets they think will be valuable, and have some idea of the costs and revenues they can expect. "If it's done right, there's a good potential of earning as much as $6 million within a year," he said.

Most criminals start off with an off-the-shelf botnet kit, such as Zeus or Butterfly, and begin seeding open environments, such as Bit Torrents and newsgroups. They use Dynamic DNS for command and control, and multiple command-and-control servers, making themselves harder to track.

"The first botnet is usually a proof-of-concept, rather than a production network," Ollmann said. "You're validating principles and doing testing." Once the operator has established the initial botnet, he can begin to build a reputation and trust, which will make it easier to build and sell services on future botnets, he said.

But most botnet operators are eventually caught because of mistakes they make in these early phases, Ollmann said. "They almost always make mistakes while they're learning," he said. "They use an alias that they've used before, or they use a credit card that can be traced back to them. The Mariposa operators were caught because one of them dialed in from his home IP address. Mistakes at the beginning can be fatal."

Many successful botnet operators actually operate more than one botnet, Ollmann said. "There's a common myth that there's one botnet per botmaster," he said. "But smart operators don't want to lose everything on one go, so they've got more than one going."

Smart operators also vary their campaigns -- they may target different groups of victims, build around different themes, or carry out different attacks, Ollmann said. Some botnets might be used to deliver malware, while others are simple spam delivery services.

"They may conduct a series of overlapping build campaigns," Ollmann said. "With a target of 25,000 victims a week, they may bring in $1,000 to $5,000 a week."

Ollmann's company, Damballa, detects around 30 to 100 new botnet operators every week. "There's no barrier to entry," he said. And although industry researchers often focus on the largest botnets, the most successful operators are those who keep their networks small, so as not to attract too much attention.

"The noisier they are, the more likely they are to be detected," Ollmann said. "That's not what the criminal wants." In fact, small botnets that target specific companies or specific groups of users -- such as wealthy executives -- may sometimes be more lucrative than much larger botnets."

Botnet operators are becoming an important part of the cybercrime infrastructure, and there is a growing demand for their services which makes it an attractive entry point for new players, Ollmann said.

"You don't need a lot of technical knowledge, and you don't need to be a hardened criminal," Ollmann said. "You can get started with kits and services that are readily available on the Internet. It's not hard to get started."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-4403
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in Zen Cart 1.3.9h allow remote attackers to hijack the authentication of administrators for requests that (1) delete a product via a delete_product_confirm action to product.php or (2) disable a product via a setflag action to categories.ph...

CVE-2012-2930
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to hijack the authentication of administrators for requests that (1) add a user via an adduser action to admin/index.php or (2) conduct static PHP code injection attacks in .htusers...

CVE-2012-2932
Published: 2015-04-24
Multiple cross-site scripting (XSS) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to inject arbitrary web script or HTML via the (1) selitems[] parameter in a copy, (2) chmod, or (3) arch action to admin/index.php or (4) searchitem parameter in a search action to admin/...

CVE-2012-5451
Published: 2015-04-24
Multiple stack-based buffer overflows in HttpUtils.dll in TVMOBiLi before 2.1.0.3974 allow remote attackers to cause a denial of service (tvMobiliService service crash) via a long string in a (1) GET or (2) HEAD request to TCP port 30888.

CVE-2015-0297
Published: 2015-04-24
Red Hat JBoss Operations Network 3.3.1 does not properly restrict access to certain APIs, which allows remote attackers to execute arbitrary Java methos via the (1) ServerInvokerServlet or (2) SchedulerService or (3) cause a denial of service (disk consumption) via the ContentManager.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.