{"id":565,"date":"2009-05-09T16:26:15","date_gmt":"2009-05-09T20:26:15","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=565"},"modified":"2022-12-30T12:11:35","modified_gmt":"2022-12-30T17:11:35","slug":"lessons-from-botnet-demise","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/lessons-from-botnet-demise\/","title":{"rendered":"Lessons From Botnet Demise"},"content":{"rendered":"<p><a href=\"http:\/\/www.theemailadmin.com\/2012\/07\/do-you-have-zombies-sending-spam\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-100940\" title=\"Lessons From Botnet Demise\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/computer_zombies.jpg?resize=120%2C110&#038;ssl=1\" alt=\"Lessons From Botnet Demise\" width=\"120\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/computer_zombies.jpg?resize=150%2C138&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/computer_zombies.jpg?resize=75%2C69&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/computer_zombies.jpg?w=400&amp;ssl=1 400w\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" \/><\/a>Brian Krebs on the <em><a href=\"http:\/\/www.washingtonpost.com\" target=\"_blank\" rel=\"noopener noreferrer\">Washington Post<\/a><\/em> blog <a href=\"http:\/\/voices.washingtonpost.com\/securityfix\/2009\/05\/zeustracker_and_the_nuclear_op.html\" target=\"_blank\" rel=\"noopener noreferrer\">Security Fix<\/a> profiled a case where a <a href=\"http:\/\/en.wikipedia.org\/wiki\/Bot_herder\" target=\"_blank\" rel=\"noopener noreferrer\">bot-herder<\/a> killed 100,000 <a href=\"http:\/\/en.wikipedia.org\/wiki\/Zombie_computer\" target=\"_blank\" rel=\"noopener noreferrer\">zombie clients<\/a> in his <a href=\"http:\/\/en.wikipedia.org\/wiki\/Botnet\" target=\"_blank\" rel=\"noopener noreferrer\">botnet<\/a>. The bot-herder implemented a &#8220;kill operating system&#8221; or kos command resident in the Zeus bot-net crimeware. The kos command caused the infected PCs to <a href=\"http:\/\/en.wikipedia.org\/wiki\/Blue_Screen_of_Death\" target=\"_blank\" rel=\"noopener noreferrer\">Blue Screen of Death<\/a> (BSOD). The Madrid-based security services firm S21sec reports that invoking the kos command only results in a blue screen and subsequent difficulty booting the OS. There appears to be no significant data loss and neither the Trojan binaries nor the start-up registries are removed, In this post, they look at what happens to an infected computer when it receives a Zeus kos.<\/p>\n<h3>Russian botnet<\/h3>\n<p>The Zeus crimeware was designed by the <a href=\"https:\/\/web.archive.org\/web\/20120713235513\/http:\/\/www.usatoday.com:80\/tech\/news\/computersecurity\/2008-08-04-hacker-cybercrime-zeus-identity-theft_N.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Russian A-Z<\/a> to harvest financial and personal data from PCs with a Trojan. UK Computer security firm <a href=\"http:\/\/www.prevx.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Prevx<\/a> found the Zeus crimeware available for just $4,000. The fee includes a DIY &#8220;exe builder&#8221; which incorporates a kernel-level rootkit. According to the <a href=\"https:\/\/web.archive.org\/web\/20130203214851\/http:\/\/www.prevx.com\/blog\/112\/ZEUS-steals-information-from-home-and-business-PCs.html\" target=\"_blank\" rel=\"noopener noreferrer\">Prevx<\/a> this means it can hide from even the most advanced home or corporate security software. RSA detailed the capabilities of Zeus crimeware in 2008. Zeus also includes advanced &#8220;form injection capabilities&#8221; that allows it to change web pages displayed by websites as they are served on the user&#8217;s PC. For example, criminals can add an extra field or fields to a banking website asking for credit card numbers, social security numbers, etc. The bogus field makes it look like the bank is asking you for this data after you have logged on and you believe you are securely connected to your bank.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>The reason for BSODing 100,000 machines isn&#8217;t quite clear. Several security experts have offered up their opinions including S21sec and Zeustracker (currently down due to an apparent DDOS). What is clear are the implications of this action.<\/em><\/p>\n<p><em> Botnets and their related crimeware are dangerous for more and more reasons. They can steal massive amounts of personal data. They can launch denial-of-service attacks and they can execute code. I agree with Krebs that the scarier reality about malicious software is that these programs leave ultimate control over victim machines in the hands of the attacker.<\/em><\/p>\n<h3><em>Politically motivated attackers<\/em><\/h3>\n<p><em>For the time being, it is still in the best interests of the attackers to leave the compromised systems in place. They can plunder more information. However, imagine the social chaos created if <\/em><em><a href=\"https:\/\/web.archive.org\/web\/20120408100202\/http:\/\/www.pcworld.com\/businesscenter\/article\/157858\/downadup_worm_bores_into_9_million_pcs.html?tk=rel_news\" target=\"_blank\" rel=\"noopener noreferrer\">9 million<\/a> PCs infected with <\/em><em><a href=\"http:\/\/en.wikipedia.org\/wiki\/Conflicker\" target=\"_blank\" rel=\"noopener noreferrer\">Conflicker<\/a> including hospitals from <a href=\"https:\/\/web.archive.org\/web\/20090503003516\/http:\/\/www.siliconvalley.com:80\/news\/ci_12257206?nclick_check=1\" target=\"_blank\" rel=\"noopener noreferrer\">Utah<\/a> to the <a href=\"http:\/\/www.theregister.co.uk\/2009\/01\/20\/sheffield_conficker\/\" target=\"_blank\" rel=\"noopener noreferrer\">UK<\/a> were under the control of Al-Queda or other similarly minded groups. These politically motivated attackers could order all the infected machines to BSOD, creating computer-enhanced chaos. One of the forgotten lessons of 9-11 is that our technology can be hi-jacked and turned against us.\u00a0 This could be the opening into a new type of cyber warfare.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Brian Krebs profiled a case where a bot-herder killed or kos command resident in the Zeus botnet crimeware that made the infected PC&#8217;s BSOD<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3216,58,761,605,768,2920,23,2835,4,127],"class_list":["post-565","post","type-post","status-publish","format-standard","hentry","category-security","tag-3216","tag-botnet","tag-brian-krebs","tag-cyberwarfare","tag-denial-of-service-attack","tag-dos","tag-malware","tag-russia","tag-security","tag-zeus"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=565"}],"version-history":[{"count":6,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/565\/revisions"}],"predecessor-version":[{"id":132759,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/565\/revisions\/132759"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}