Major Infection Channels
2 biggest:
Ransomware
-> victims pays to get privkey - asymm_dec(K’, privkey)
Banking Trojan
RATs / RAT Trojans
- essentials control computer remotely; search files controls mouse and keyboard, install applications
Spambots
DDoS Bots
- server is overloaded -> not reachable anymore
Fake AV (Fake Anti-Virus) / Scareware / Rogueware
Adware
Crypto-mining
Dialers
Worms
Rootkits
Command & Control: Communication Protocols
C&C: Centralized Architectures
=> single point of failure
C&C: Domain Generation Algorithms
- if alg. leaked it’s over
C&C: Peer-to-Peer (P2P) Botnets
-> bots make up network with Structured: - distributed hash table - commando stored at ID unstructured: - no hash table - command via broadcast