What are bots/ botnets?
Bots: A bot is piece of malicious software with remote control capabilities
Botnet: A network of computers infected with a bot. The bot is controlled by C&C (Command and Control) Infrastructure. The attacker, which controls the botnet is called herder. The infected computer is called a zombie or drone.
What are attacks mounted with the help of botnets?
-Distributing spam and phishing emails
-Mounting distributed denial of service (DDoS) attacks
-Conducting data theft with the help of spyware like key
loggers, webcam recording capabilities…
-Conducting click-fraud
-Spreading new malware
What is the life-cycle of a bot from a herder point of view?
-Creation: Development of the botnet software often reusing existing code
Infection: via Software vulnerabilities, drive-by-downloads,
Trojan horses, email attachments,…
Rallying: Bots start up for the first time and attempt to contact the C&C server(s)
- Centralized: join IRC channel, connect to HTTP server
- Decentralized: bootstrapping protocol to detect other peers in the P2P
network
Waiting: Bots wait for commands from the botmaster through C&C
infrastructure
Executing: Bots execute commands received through the C&C
infrastructure
-E.g. scanning for new victims, downloading updates, sending DoS floods,….
What is the life-cycle of a bot from a defense point of view?
-Detection
-Capturring
-Analysis
-Tear Down
What are the C&C techniques?
Centralized:
- IRC (Internet Relay Chat)
- HTTP
Decentralized:
- P2P (Usually hybrid)
How is a centralized botnet taken down?
-Locate C&C Server and take them down:
- Analyze network traffic of bots
-Make C&C Server unreachable
- Block DNS/ IP range
-**Find out which devices in your network are infected
-Use Sinkhole with DNS entry and see who connects
How is the IP of a C&C Server hidden?
Domain Generating Algorithms (DGAs):
- Use a seed to generate domain names and query them
- Most domains are not registered, but some are
Fast Flux in DNS
- Multiple IP addresses on a single DNS record, cahnged quickly
- No one server to take down
How is a P2P botnet taken down?
How to track down botnet herders?
Roles in organzied crime with Botnets
How is money made from Botnets?
Stealing Information
- Selling bank account
- Selling identity information
Ransomware
DDOS
What was the Mirai Botnet and how did it work?
What is Stuxnet and how did it work?