{"id":1294,"date":"2009-10-10T23:56:37","date_gmt":"2009-10-11T03:56:37","guid":{"rendered":"http:\/\/rbach.net\/blog\/?p=1294"},"modified":"2022-12-30T12:18:48","modified_gmt":"2022-12-30T17:18:48","slug":"size-doesnt-matter-for-botnets","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/size-doesnt-matter-for-botnets\/","title":{"rendered":"Size Doesn&#8217;t Matter for Botnets"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20120918215441\/http:\/\/www.techsling.com:80\/2010\/03\/how-to-tackle-botnet-attacks-part-three\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-111005\" title=\"Size Doesn't Matter for Botnets\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/botnets2.png?resize=110%2C99&#038;ssl=1\" alt=\"Size Doesn't Matter for Botnets\" width=\"110\" height=\"99\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/botnets2.png?resize=150%2C136&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/botnets2.png?resize=75%2C68&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/botnets2.png?w=251&amp;ssl=1 251w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a><em><a href=\"https:\/\/web.archive.org\/web\/20091205224026\/http:\/\/www.darkreading.com:80\/securityservices\/security\/perimeter\/showArticle.jhtml?articleID=220300610\" target=\"_blank\" rel=\"noopener noreferrer\">DarkReading<\/a><\/em> points out a <a href=\"http:\/\/www.messagelabs.com\/mlireport\/MLI_2009.09_Sept_FINAL_US_EN.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">new report<\/a> released on 09-29-09 from researchers at <a title=\"Symantec\" href=\"https:\/\/securitycloud.symantec.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Symantec&#8217;s<\/a> <a title=\"MessagLlabs\" href=\"http:\/\/www.messagelabs.com\/default.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">MessageLabs<\/a> unit which provides a detailed analysis of the size and output of current <a title=\"Botnet\" href=\"http:\/\/en.wikipedia.org\/wiki\/Botnet\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">botnets<\/a>. One of the report&#8217;s conclusions: Size doesn&#8217;t always matter.\u00a0 <a title=\"Rustock botnet\" href=\"http:\/\/en.wikipedia.org\/wiki\/Rustock_botnet\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Rustock<\/a>, for example, is still the largest of the botnets, with an estimated size of between 1.3 million and 1.9 million nodes. <a title=\"Cutwail botnet\" href=\"http:\/\/en.wikipedia.org\/wiki\/Cutwail_botnet\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Cutwail<\/a> is next in size, with an estimated 1 million to 1.5 million bots.<\/p>\n<p><a href=\"https:\/\/securitycloud.symantec.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-111001 size-full\" title=\"Symantec logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/symantec_logo-2.jpg?resize=123%2C74&#038;ssl=1\" alt=\"Size Doesn't Matter for Botnets\" width=\"123\" height=\"74\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/symantec_logo-2.jpg?w=123&amp;ssl=1 123w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/symantec_logo-2.jpg?resize=75%2C45&amp;ssl=1 75w\" sizes=\"auto, (max-width: 123px) 100vw, 123px\" \/><\/a>But neither of these two botnets is the largest proliferator of spam, according to Paul Wood, senior analyst at MessageLabs and one of the authors of the report. That title goes to a rapidly emerging botnet called <a title=\"Grum botnet\" href=\"http:\/\/en.wikipedia.org\/wiki\/Grum_botnet\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Grum<\/a>, which delivered an average of 39.9 billion spam messages per day last quarter &#8212; more than 23 percent of all the spam on the Internet.<\/p>\n<p>&#8220;<em>Despite the fact that it&#8217;s half the size of Rustock, Grum is generating much more spam,<\/em>&#8221; Wood says. &#8220;<em>It&#8217;s getting each bot to do a lot more work.<\/em>&#8221;<\/p>\n<p>Bobax, a botnet that has been around for more than two years, is also becoming more efficient, generating more than 27 billion messages per day and 15.2 percent of all <a title=\"Spam (electronic)\" href=\"http:\/\/en.wikipedia.org\/wiki\/Spam_%28electronic%29\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Internet spam<\/a>, the report says. That means each Bobax node generates more than 1,400 spam messages per minute.<\/p>\n<p>Botnet operators have discovered that many <a title=\"Internet service provider\" href=\"http:\/\/en.wikipedia.org\/wiki\/Internet_service_provider\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">ISPs<\/a> don&#8217;t immediately recognize the huge output of individual bots because each bot&#8217;s performance is affected only on the upload, not on the download, Wood says. &#8220;Y<em>our computer might be a bot, but it might not affect your download performance very much,&#8221; he observes. &#8220;It&#8217;s only when users try to upload something and experience a performance problem that the ISP gets a complaint.<\/em>&#8221;<\/p>\n<p>As they become more sophisticated, botnet operators are finding ways to make their infrastructures more efficient, Wood says. A new botnet, Maazben, accounted for only 0.5 percent of Internet spam 30 days ago, but now is generating 4.5 percent &#8212; about 2.4 billion messages a day &#8212; at its peak. As with Bobax, each Maazben bot is highly productive, pushing out nearly 1,300 spam messages per minute.<\/p>\n<p>No matter what their size or how efficiently they operate, botnets clearly are at the heart of the spam problem, MessageLabs says. According to the report, botnets generated an average of more than 150 billion messages per day last quarter &#8212; nearly 88 percent of all the spam on the Internet.<\/p>\n<p>&#8220;<em>The takedown of ISPs like <a title=\"McColo\" href=\"http:\/\/en.wikipedia.org\/wiki\/McColo\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">McColo<\/a> definitely helped, but it doesn&#8217;t solve the problem,<\/em>&#8221; Wood says. &#8220;<em>Already we see botnet operators spreading traffic across multiple ISPs, effectively giving themselves better backup than some enterprises have.<\/em>&#8221;<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.welivesecurity.com\/2014\/10\/22\/botnet-malware-fight\/\" target=\"_blank\" rel=\"noopener noreferrer\">Botnet malware: What it is and how to fight it<\/a> (welivesecurity.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Botnets sparead spam MessageLabs says the Grum botnet is the largest spam source on the Internet which delivered more than 23% of all the spam on the Internet<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3216,58,1779,23,1139,1766,4,165,1366],"class_list":["post-1294","post","type-post","status-publish","format-standard","hentry","category-security","tag-3216","tag-botnet","tag-cutwail","tag-malware","tag-mccolo","tag-rustock","tag-security","tag-symantec","tag-symc"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=1294"}],"version-history":[{"count":9,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1294\/revisions"}],"predecessor-version":[{"id":132426,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1294\/revisions\/132426"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=1294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=1294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=1294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}