Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43431
  • Total Topics: 16526
  • Online today: 2962
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 1
Guests: 2829
Total: 2830









Author Topic: Hosting firm shutdown forces botnets to relocate  (Read 2445 times)

0 Members and 1 Guest are viewing this topic.

Samker

  • SCF Administrator
  • *****
  • Posts: 7529
  • KARMA: 322
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • SCforum.info - Samker's Computer Forum
Hosting firm shutdown forces botnets to relocate
« on: 14. November 2008., 09:00:00 »


The shutdown Tuesday of a California-based hosting company not only knocked down spam volumes but has also put a dent in malware-spreading botnets and other criminal activity, researchers said today.

While cybercriminals will face some short-term difficulties as they are forced to relocate their operations, the relief will be only temporary for the world's Internet users, the researchers added.

McColo Corp., the San Jose company that was cut off from the Web by its upstream Internet providers two days ago, hosted a staggering variety of cybercriminal activity, according to researchers familiar with its operation. Other than spewing out huge quantities of spam -- by some estimates, at times up to 75% of all spam -- McColo hosted the command-and-control servers of some of the biggest botnets, hosted child pornographic sites and domains that hustled users for money by scaring them into thinking that their PCs were infected with massive amounts of malware .

Among the world's largest botnets controlled from servers hosted by McColo, researchers have counted the Sinowal, Srizbi and Rustock networks.

The hosting service even harbored the server that RSA Security Inc. found that contained more than 500,000 stolen online bank and credit card accounts .

Paul Ferguson, a network architect at Trend Micro Inc. , was one of 10 security researchers who put years of work into investigating McColo and documenting its criminal activities. "The work goes back two years," said Ferguson. "We did our due diligence, and went through legitimate channels" in an attempt to get McColo to change its spots. "But they just played a shell game when they did respond, maybe change an IP address on one domain. They weren't serious. So we decided it was time to shine a light on the darkness."

Ferguson joined nine other researchers to publish a paper Wednesday called "McColo: Cyber Crime USA" that detailed their findings. The paper is available on the HostExploit.com site (download PDF) .

Although the move may stymie online criminal activity for a time, and spam levels remained significantly lower today than before McColo's shutdown -- according to IronPort , spam volumes are down about 58% Thursday from Monday's numbers -- Ferguson and others were only cautiously optimistic.

"I completely expect the criminal operators that were 'pulling the strings' in McColo to redeploy their operations elsewhere," said Ferguson. "That's almost a given." Ferguson added that there are signs the criminals are already shifting their servers and domains to other hosting companies.

Ben Feinstein, director of operations for the counter threat unit of SecureWorks Inc. , an Atlanta-based security company, echoed Ferguson. "In the short term, this may have a positive effect in reducing online crime, but in the medium- and long-term, they'll reorganize and move to other hosting providers."

The move won't even be that hard, said Feinstein. "The real pioneers of cloud computing were these criminal organizations," he argued. "One of the features of a lot of these botnets is that they can push out updates to the bots to point them toward new command-and-control servers. So while they may lose some bots, they will be able to reconstruct their botnets."

That doesn't mean this week's take-down was for naught.

"There are two important by-products of that [forced] redeployment," said Ferguson. "It increases the cost of doing business for them, and when they do move, we can observe and track them."

"It's definitely a positive take-away," said Feinstein. "This, and the Intercage take-down [in September] serve as examples that if you allow this kind of activity to run rampant on your network, or you're aiding and abetting criminals, there can be consequences."

Even then, however, Feinstein said there might be a dark lining to the cloud. "McColo's upstream providers were responsive in the end [to the evidence], but are you going to get that from other providers in other parts of the world? Unlikely. So big take-downs like this may get more difficult."

"I'm just taking solace in small victories," countered Ferguson. "What we have to try to do is raise the cost of doing business for these guys."

(NetworkWorld)

Samker's Computer Forum - SCforum.info

Hosting firm shutdown forces botnets to relocate
« on: 14. November 2008., 09:00:00 »

 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023