Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

4/18/2007
08:55 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Botnets Battle Over Turf

Some botnets even patch their infected machines to prevent other botnets from hijacking them

More botnet-on-botnet turf wars have erupted -- and intensified -- over the past few months. (See Black Hat: Botnets Go One-on-One and Botnets Don Invisibility Cloaks.)

Aside from the distributed denial-of-service (DDOS) attacks they launch against one another to disrupt their operations (like the recent DDOS battles between the Storm and Stration botnets), they also are constantly trying to hijack bots from one another. "Stealing is easier than building [out] one," says Danny McPherson, chief research officer for Arbor Networks, who tracks botnet activity.

But the savvier botnets go the extra mile to protect their captor capital: Some actually "secure" the bot machines they have infected so no other botnets can steal them or utilize them, too. They install patches on their bots, for instance, to close the security holes and shut down open ports that are vulnerable to attack. "They are installing defenses to make sure no one else doubly infects the machine," says Paul Mockapetris, chairman and chief scientist of Nominum. "There are instances where a machine is infected, and part of that is defense against another infection."

Patching their bots and shutting out other botnets is no harder than initially recruiting a machine as a bot, security experts say. "It would be trivial for a bot to compromise a machine and apply Microsoft's recommended workarounds to prevent re-infection," says David Maynor, CTO of Errata Security.

The bottom line is the bottom line, of course: The more bots you have, the better chance you have of making money off your spam runs, identity theft efforts, etc. And bots are often used to advertise botnet services, too, touting features such as IP addresses that change every 10 minutes.

"They market their own botnet services through the bots. It's an entire economy," Arbor's McPherson says.

McPherson says bots are more of a commodity now. Part of the problem, he says, is that antivirus and IDS tools only detect about 75 percent of malware, which makes it fairly simple to zombify a consumer's machine.

Meanwhile, as botnets are also ditching their old-school Internet Relay Chat (IRC) channels for HTTP and peer-to-peer communications to be less conspicuous to investigators, it raises the bar for their infighting as well.

"Now they have more sophisticated P2P systems -- and hijacking [one another] may be more difficult," notes Adam O'Donnell, senior research scientist for Cloudmark. Still, "botnet hijacking is a common occurrence."

O'Donnell says when new attack vectors are publicized for popular operating systems, it's easy to build up a botnet using them if the botnet operator gets there first. "If those systems become botted quickly by other parties, then it may become easier for a party just to hijack someone else's network."

It's one incestuous ecosystem. Says Errata Security's Maynor: "Think of bot masters like stock brokers: They are always going to go back and cannibalize their base first."

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • Arbor Networks Inc.
  • Cloudmark Inc.
  • Errata Security
  • Nominum Inc.

    Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    97% of Americans Can't Ace a Basic Security Test
    Steve Zurier, Contributing Writer,  5/20/2019
    How a Manufacturing Firm Recovered from a Devastating Ransomware Attack
    Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/20/2019
    Why AI Will Create Far More Jobs Than It Replaces
    John DiLullo, CEO, Lastline,  5/14/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win a Starbucks Card! Click Here
    Latest Comment: Talk about vendor lock in...
    Current Issue
    Building and Managing an IT Security Operations Program
    As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
    Flash Poll
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-11816
    PUBLISHED: 2019-05-20
    Incorrect access control in the WebUI in OPNsense before version 19.1.8, and pfsense before 2.4.4-p3 allows remote authenticated users to escalate privileges to administrator via a specially crafted request.
    CVE-2019-10076
    PUBLISHED: 2019-05-20
    A carefully crafted malicious attachment could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.
    CVE-2019-10077
    PUBLISHED: 2019-05-20
    A carefully crafted InterWiki link could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.
    CVE-2019-10078
    PUBLISHED: 2019-05-20
    A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. Initial reporting indicated ReferredPagesPlugin, but further analysis showed that multiple plugins were vulnerable.
    CVE-2019-12239
    PUBLISHED: 2019-05-20
    The WP Booking System plugin 1.5.1 for WordPress has no CSRF protection, which allows attackers to reach certain SQL injection issues that require administrative access.