Storm Worm Botnet Partitions May Be Up For Sale 192
Bowling for cents writes "There is evidence that the massive Storm Worm botnet is being broken up into smaller networks, and a ZDNet post thinks that's a surefire sign that the CPU power is up for sale to spammers and denial-of-service attackers. The latest variants of Storm are now using a 40-byte key to encrypt their Overnet/eDonkey peer-to-peer traffic, meaning that each node will only be able to communicate with nodes that use the same key. This effectively allows the Storm author to segment the Storm botnet into smaller networks. This could be a precursor to selling Storm to other spammers, as an end-to-end spam botnet system, complete with fast-flux DNS and hosting capabilities."
What is fast flux DNS? (Score:3, Interesting)
Re:What is fast flux DNS? (Score:5, Informative)
Re: (Score:2)
Re:What is fast flux DNS? (Score:4, Funny)
Re: (Score:2, Funny)
Re: (Score:2)
They rotate the IP, but the name stays the same ? Why cant the registrar just shut them down ?
Re: (Score:2)
Do something illegal on a computer which a domain points to and the domain registrar cannot shut you down, only the host of the computer can.
Infringe someone's trademark with a domain however can be grounds for domain deletion.
Re: (Score:2, Informative)
Re:What is fast flux DNS? (Score:4, Informative)
Are there legitimate reasons to do this... (Score:3, Interesting)
Yes. Re:Are there legitimate reasons to do this... (Score:3, Interesting)
On the other hand, I defintiely see ISPs that don't respect DNS TTLs
Re:Are there legitimate reasons to do this? (Score:2)
Is this another one of those things an ISP *could* do to help control this scourge? Could they reject all DNS responses with a TTL below some threshold, even if its 29 seconds, and not break legitimate access? Or keep those responses in the cache and flag/reject follow-on responses if
Re: (Score:2)
Amen.
Re:Yes. Re:Are there legitimate reasons to do this (Score:4, Insightful)
It really only makes a difference if your domain's TTL is short before you need to make the change.
Re: (Score:3, Informative)
The other issue is that TTL is a suggested time for keeping your records alive. The other (caching) nameserver can choose to ignore it (to circumvent stuff like this botnet or just to keep it's own load down) or if it can't reach your nameservers after that TTL you specified it will just
Re: (Score:2)
* Some (IMHO misguided) sysadmins think "oh, I'll put in a super short TTL and I can swap out servers/services/whatever at a moment's notice".
Quite frankly, most never end up needing to do this super-fast swapping or round-robin switching and it's just one of those 'good ideas' that have very little practical value for the majority of those using it. And it's often trivial to do using other less-burdensome methods especially for mail servers -- MX has built in fail-over.
Re: (Score:3, Insightful)
Re: (Score:3, Interesting)
No governments are interested in dealing with this problem.
Three words (Score:3, Insightful)
How long before.. (Score:5, Interesting)
How long before Storm is better than the Internet?
It seems to be peer-2-peer, can host files, must be reliable (DNS and all that), encrypted traffic.
If you assume Internet is past its sell by date, what would the next generation network look like?
:-)
(OK, maybe it wouldn't be owned by the mafia (insert USA joke here))
"not truly inventive"??? WTH? (Score:3, Insightful)
Re: (Score:2)
Microsoft?
Re-infect it how? (Score:3, Insightful)
Survival of the fittest in action (Score:3, Insightful)
These things are getting so insidious and vast in scope, I'm honestly wondering if I can safely believe that any Windows machine I come across with problems ISN'T on Storm or one of the other botnets. At what point does having a multi-use computing device become more of a problem than the benefits it provides? If 90% of what you get for connecting to the Internet is problems, what's the point? Bile spewing bloggers, bought-and-paid news reports and total advertising awareness?
Re: (Score:2)
Plus, botnets are pretty sweet. I wouldn't mind having one myself, for, you know, distributed compiles or something
Re: (Score:2)
You may not be able to blame anyone. But I can certainly assign blame.
Is the person/group that designed this botnet talented? Without a doubt. Do they deserve respect? Hell, no.
If you respect this person, then you would have to also respect the people who put together those televangelist networks and faith-healers. Liars, cheats, and thieves. They deserve no respect.
Re: (Score:2)
Admiration, that they shouldn't have.
Re: (Score:2, Insightful)
Actually, they have my admiration. Storm is an amazing piece of work, and for some reason I like the idea that it took criminals to implement something so genius.
Hot bitches sucking their cocks on demand is what they don't deserve.
Re: (Score:2)
I think it shows how ambiguously the whole community feels.
As far as I am concerned we should see spammers as opponent and respecting opponents is a good thing. They have done some clever moves over the last years and I still wait for a good answer from the community. I wouldn't expect much useful from companies like Microsoft here. I think the spammers utilize much of the best concepts that are around and I think an answer can only be a community driven (i.e. open source) decentralized countermove.
http
Re: (Score:2)
Re: (Score:2)
Re:Survival of the fittest in action (Score:5, Interesting)
I spyware scanned three PCs belonging to two friends/family households. Naturally, they were all Windows. I used Webroot Spysweeper which is pretty good but costs, and Kaspersky online scan, which is good but slow, and virus only.
- PC 1: infected with various spyware and a backdoor trojan (remote access by the bad guys) - had an up to date antivirus (AVG) that didn't spot any of this, but no anti-spyware installed.
- PC 2 (same network as 1): couldn't even install new software (error on running any new
- PC 3: (2nd household) - infected with a different backdoor trojan and several viruses. Had Norton anti-virus that had not updated since 2004.
I would assume the average Windows PC has a high chance of some sort of infection, unless the users are very careful about installing third party software, some of which carries spyware or worse, and clicking on links in IE. Even Firefox had spyware on one of these machines.
Windows PCs run by power users (not the users here) can be somewhat secure, but it's painful to make them so. One colleague who's very techie still got infected by a PDF security hole recently, so you need Secunia PSI to run continuously, as well as monitoring some security blogs, and updating software regularly, as well as using a good anti-spyware tool, not using IE/Outlook, etc etc. However, once you are making this much effort, the work needed to install Ubuntu becomes much less of a hurdle - you might as well just switch over one PC so you have a safe PC for online shopping/banking etc.
The only good thing about this story is that nothing very important was being done on these PCs - little online shopping and no online banking... however, that's the users' self-reported status and they may well not want to admit they are at risk.
I don't do this for a living, I'm just a Windows and Linux user who wondered why there were so many popups on one of these PCs and ended up getting sucked into this when I should have been socialising - fortunately anti-spyware scans can run during dinner...
Re: (Score:2)
It is my non-expert (I am not certified to say this) opinion that there is no antivirus
Re: (Score:3, Insightful)
FWIW & YMMV, I setup my family and acquaintances with XP-SP2, IE7, Windows Defender and the latest version of SAV Corporate/Enterprise in Unmanaged mode. I just turn on Automatic Updates in Windows and setup the AV software to update every night. My biggest "problem user" is a girl whose laptop was completely owned by spyware when I first met her. After a pave and rebuild wi
Re: (Score:2)
Oddly, I haven't seen many truly serious rootkits. Most of them have been on pre-SP2 XP machines, which are (thankfully) becoming rarer.
Re: (Score:2)
Because, and only because, I refuse to hook it to a network while I'm trying to de-worm it.
the point (Score:3, Funny)
Slashvertising. (Score:5, Funny)
Clever (Score:5, Funny)
Windows has downloaded a new security update. Do you wish to install?
Re: (Score:2)
Re: (Score:2)
Break the key with zombies? (Score:5, Funny)
Re:Break the key with zombies? (Score:4, Insightful)
Re: (Score:3, Funny)
BZT! IAmSorryThankYouForPlayingNextContestantPLEEZ (Score:2)
Think about it, each machine in the network needs to talk to the other machines. The key has to be stored somewhere on the machine.
Not quite correct. Each machine in the network needs to be able to relay messages to the other machines; it therefore only needs the Public Key half, to verify that the messages it receives should be obeyed and/or passed along further (or simply dropped on the floor). The Private Key need only reside in the hands of the owner; in theory (if they're Diabolical), it could be k
Just curious.. (Score:4, Funny)
Re: (Score:2)
Blue Frog remembrance... (Score:5, Insightful)
One year later, spammers are ALREADY using a P2P system for such thing, while nobody has the means to counter them.
The lesson: They got ahead of us. It's time we invest in countermeasures of our own, or succumb to the enemy. Because, we're losing.
Re: (Score:3, Insightful)
If the dynamic residential r
Re: (Score:2)
Re: (Score:3, Insightful)
Blocking port 25 is a reasonable idea, and many ISPs do it, but to say to do otherwise is criminally negligent or that doing so would stop worms from spreading is completely absurd.
Pretty much the only effective tool ISPs have is to completely shut down the connection to any infected computer. But people will (rightly) get upset about that.
Re: (Score:2)
Hey, some of us use other POP services... (Score:2)
Where's that checklist...
Re: (Score:2)
What does POP and IMAP have to do with SMTP? You've got your MUAs and your MTAs confused. If you want to contact arbitrary SMTP servers around the world, then use port 587 or tunnel it. The rest of the SMTP servers of the world who don't know you would just as soon rather not talk to you if you're some anonymous dynamic IP. And the people that wrote that checklist think the same
Re: (Score:2)
Bruce Schneier discusses the Storm Worm (Score:5, Informative)
A good essay on the Storm Worm and how it works and how it can be prevented (or rather why it CAN'T be prevented in many cases).
Re: (Score:2)
Re: (Score:2)
also
Computer Science Laboratory, SRI International, has a report Dated 10-10-07 on the Storm Worm with good detail: http://www.cyber-ta.org/pubs/StormWorm/report/ [cyber-ta.org]
PDF of the same report: http://www.cyber-ta.org/pubs/StormWorm/SRITechnical-Report-10-01-Storm-Analysis.pdf [cyber-ta.org]
Fixing one part (Score:2)
Yes, it's inconvenient to some ("wah! but I run sendmail off my laptop on dial-up!" - Yeah, well, go back in time to 1993 and have yourself a ball...). Frankly, they can just get the hell over it and use one of a dozen other methods to send out mail or increase their TTL. Spam is way more inconvenient and it affects everyone.
This doesn't address other uses for these botne
Re: (Score:2)
It's not a 'trap'. It's part of the spec and RFC 1033 spells it out in a section called "instructions". Where's the voodoo in that?
Anyone who can't do this properly (following what amounts to a checklist of 'do this, then do this') shouldn't be handling zone records.
The problem is people NOT following spec, not any failing of the spec.
Re: (Score:2)
Re: (Score:2)
If you're using some web interface, then the host/ISP has the responsibility to prepare the records right.
If you're not and you're doing your own zone files, then you do.
If the people in either scenario cannot create the records properly, they shouldnt' be doing it. Plain and simple.
DNS is a critical part of the Internet. Possibly the most critical part. And as such its not something Jo
Re: (Score:2)
Re: (Score:2)
Why is reverse DNS bad?
Re: (Score:2)
Which requirement are you thinking about? I know of at least two completely different requirements that people have made, each of which could match the description you gave.
So, how bad is it? (Score:3, Interesting)
These blurbs, if they're true, paint a bleak picture. Should the hackers leverage the network's full power, couldn't they shut down just about any server on earth? And imagine the bandwidth costs of this thing operating at full force.
So for those in the know, is Storm just a way to propagate spam and annoy people? Or is it something even more dangerous?
Re: (Score:2)
So far as anybody knows, it does nothing just yet, except for a very small part that is used to spread Storm. The prevailing theory is that it is for sale to the highest (criminal) bidder. It looks like somebody is getting serious about providing hijacked hosts for sale (this is not a new activity, but it's never happened on this scale before). One or more of the organised crime syndicate
Re: (Score:2)
I'm not "in the know" per se, but my analysis of the situation - especially given the developments mentioned above - is that Storm probably is both. If all you want to do is to make money then it really doesn't matter if you're selling your power for spam or for attacking governments. Money is money. So if a black hat decides that instead of just sending the usual spam out he'd real
Re: (Score:3, Insightful)
What is the difference between that statement and "I have no idea how many, so I'll toss out scary numbers."
(hint: the second statement is honest)
Rename (Score:4, Funny)
How would this service be marketed? (Score:2)
Re: (Score:2)
Re: (Score:2)
Obviously, criminal activities aren't marketed in the open...seen any adverts for Drugs recently (yes the good fun kind, not the prescriptions they shove down your throat)...not saying I know for sure, but I think people can still get them.
Re: (Score:2)
Can it be that hard to catch whoever is behind it? (Score:2)
Re: (Score:2)
Small = harder to find unless you area a '133t' programer bragginb about how good youare.
You want to keep a secret you tell NO ONE, you don't go spreading it around.
The real way to kill storm is to basically start having interpol treat it like drug trafficking, getting real cooperation, fairly quickly, instead of just ignoring it as not important.
You have cops not investigate one crime then guess what happens -
Re: (Score:2)
These two statements pretty much contradict each other. Who are you going to get to cooperate if it's a single individual, or small, well insulated group?
This problem is its own solution... (Score:2, Interesting)
Step 2: Have each 'rented' computer run update, anti-virus, anti-malware...
Step 3: Profit! Ok, no profit, but maybe you get to enjoy reduced amounts of spam.
Repeat until bored.
Re: (Score:2)
I'm starting to think that spammers should get familiar with the business end of a Desert Eagle .50 or similar device.
Re: (Score:2)
Step 4: Never be seen again after you get shot in the head, dismembered, and buried in the desert by the organized crime connections of the botnet owners.
Re: (Score:2)
What is preventing a sting? (Score:3, Insightful)
And if we don't have the REAL people to work on this, perhaps we should hire Hollywood to get the job done because it seems like the only real law enforcement that happens these days is in the movies or on TV.
Re: (Score:2)
You assume too much in not considering that Interpol or the NSA or Mossad may very well run this thing.
Not claiming that they do, but finding out they do wouldn't surprise me in the least.
Re: (Score:2)
Re: (Score:2)
Unethical countermeasures? (Score:2, Interesting)
I've recently read some stories about this botnet. From what I've gathered it's powerfull enough to do some serious damage in a society. Cyber attacks can disrupt our lives in multiple ways after all.
Imo we're just lucky so far that it hasnt been used for some serious attack on money/bank agencies, public transport, etc etc, stuff close to us and vital for average day life. (or am I just being to paranoid now?)
The hosts that are infected will most likely
Re: (Score:2)
However, at the end of the day a counter-worm would still be a worm and, and running unauthorised software on someone else's box is still unethical, never mind illegal, no matter w
Re: (Score:2)
It isn't unknown for rival worm authors to attack each other's worms.
Re: (Score:2)
STORM (mostly) just installs and hides. It doesn't DO anything that a user would notice. The only thing it does (which, generally, is not noticed) is mutate itself twice an hour.
Only a small fraction of STORM infected systems try to spread STORM. An even smaller fraction act as a distributed control net.
Since the control net is distributed, it is very difficult to trace. Since STORM is
Missing in the summary (Score:2)
c4v3aT 3mpt0R (Score:2, Funny)
CmdrTaco is behind this (Score:5, Funny)
The updates are part of the Slashdot tenth anniversary auction. In addition to the @slashdot.org address and low user id, CmdrTaco has also gotten the operators of the Storm Worm Botnet to auction its use off as part of the charity action.
Some potential uses for the winning bidder:
Only one way anything will be done about this (Score:3, Insightful)
Everyone hates spam, but spam filtering techniques have progressed to the point where we're at an uneasy stalemate with spammers. Everyone hates DDoS attacks, but in truth, how many people have really been the victim of one, and how many companies with muscle are really vulnerable to a normal-sized one? What will have to happen is that some overambitious crook gets it in their head to attack a Google or a Level3 or an Amazon or a national military, and puts the muscle behind it to make it work. It'll take players of that sort of weight to induce ISPs to do what they should have been doing all this time - proactively detecting botnet traffic and suspending the account of any user, individual or corporation, participating in such botnets.
I suppose we could also black hole enough of the world that the botnet controllers are forced into the reach of countries with tough computer anticrime resources, where they can be put behind bars and well out of the reach of any keyboard. I'm just not quite sure the Russians will stand for that....
Is the 40 byte key attackable? (Score:3, Interesting)
What would it take to attack the 40 byte key? Imagine a coordinated effort by the biggest 500 gouverment computing setups around the world. All the blue genes and whatnot pitching in. The Japanese sure have the one or other state-of-the-art mainframe supercomputer, and CERN, ESA, Nasa and few German weather services have a few aswell. There is tons of horsepower laying around idle at agencies, bureaus and the occasional school or corporation. If they all pitch in in a coordinated brute force attack *and* have Seti@Home do a few hours too it should be possible, no? Especially if one takes into account that at least the NSA has mathmatical functions that do some of the dirty work and speed up the process a little. They wouldn't even have to publish them.
Wait, let's just check:
255 to the power of 40 is rougly 1.8 times 10 to the power of 96 (Gulp!). Thats nearly Gogol. (10^100, what Google initially was supposed to be called, the guy registering the domain mixed up the letters...)
Whatever.
On it goes: For the sake of ease I'll roughly estimate that after the overhead has been dealt with, half of the top 500 (or a simular setup) will be doing optimized attacks on an average of 50 billion tries per second. An average state-of-the-art mid-range server has aprox. 20 GigaFLOPS, so I think that's fairly realistic for a large mainframe doing a multi-step operation.
250 * 50 000 000 000 = 1.25*10^13 tries per second.
*60*60*24 makes 1.08*10^18 per day. [Sidenote: This may be way off wack allready and total bollocks but it's fun actually]
*7*52*5 makes 1.96*10^21. Oh, gee. This doesn't look to good. Where at it for 5 years and have only covered less than the fourth root of our total amount of keys. Even if we had 10 times the power it would make up only 1 percent of the keypace. Sheesh. We'll probably be cheaper off in handing out Linux PCs to everyone on the planet.
It's no use. I gotta start working on my next project: Finding an explicit function for prime numbers. Hehehe. I could use the Million from the Fields Medal too.
Bottom line: My question/assumption was lame. But at least I found out myself.
Re: (Score:3, Funny)
Re: (Score:2)
Presumably they're loaded with baby oil or something.
Yes. (Score:5, Insightful)
Simple answer, complex solution.
First your firewall, useless (against storm). One of the attack paths of storm is to get YOU the user to visit an infected site, often by sending you an email. Unless your firewall somehow knows ALL infected sites and blocks them all (unlikely) the email will arrive, and the site will be visited and the trojan loaded. You could setup a firewall that protects against this, but you don't have one, because if you did, you wouldn't have to ask, you would know. Firewalls only help against worm attacks, were an outside computer probes your network for weaknesses. IF you configure your firewall extremely rigidly and only allow known traffic through it, then malware on your network could be blinded, unable to connect to any command parts of the storm network. It is possible to use for instance iptables (linux) to inspect all packages going through it and simply drop unwanted traffic. Since storm now apparently uses encrypted p2p(edonkey) traffic this shouldn't even be too hard. This would however result in a less userfriendly network. The only experience I got was in a setup that ONLY wanted regular HTTP traffic, and this meant a LOT of stuff failed, even web traffic because not all web application create proper headers. (I wonder what the recent MS stealth update means for windows, did this traffic pass unseen through software firewalls?)
Then your AV software. Forget about it, storm mutates itself. Since AV software mostly works with signatures, it can never be uptodate enough. I read a report that it changes every half hour. How the hell are you going to keep your signature data that uptodate?
Windows patches. They ain't uptodate thanks to MS dreaded patch tuesday. THis means that a security hole can EASILY be unpatched for weeks. COnsidering this is MS we are talking about, practice is far longer. You will be the target of exploits MS does not know about yet, won't develop a patch for for months, that they will delay for weeks to deploy and for which the AV companies do not have signature.
Anyway the most recent big security hole involves PDF's, that is Adobe, nothing to do with MS. You have to be uptodate on EVERYTHING. That includes EVERY codec, every handler EVERY single piece of code on your computer. Have an image browser installed? Are you sure that not a single on of the image codecs it uses has a flaw? If you update one image browser are you sure that not one single program on your computer still uses an old library that is still vulnerable? Remember, if a storm attack only infects a fraction of a percentage of computers, they still got hundreds of thousands of machines.
START TO GET THE PICTURE?
Basically you are like a good soldier, who keeps his gun clean, doesn't screw with hookers and stays awake on guard asking how well he standsup to a full out nuclear war. YOU ARE TOAST PRIVATE!
But there is hope, the most common form of infection is still through user interaction. YOU have to open the PDF, you have to execute the exe/scr/sh/dmg/whatever, you have to visit the link. The most powerfull attack is social engineering, get that soldier in his invincible armour to pickup a grenade and eat it.
The really odd thing is that you do not even have to be paranoid to avoid it. Just don't click on things. IF somebody sends you a story headline, visit the BBC site yourselve. If somebody wants to send you pictures of some celeb flashing her aging bits, don't. There is plenty of fresh porn with nice looking girls out there (cheggit.net).
So what do you need to stay safe?
Mostly, your brain. Disable every bit of automation in software and instead let your brain do the thinking. NEVER just use automatic install (spyware) and never allow for instance outlook to preload crap or preview stuff. Email is for text, not webpages. But mostly ask yourselve WHO is sending me this, and WHY. One of the most amazing attacks I seen was by sending a "joke" attachment to people in your address book. Here is a hint, I am dutch. My brother I
Re: (Score:3, Informative)
Re: (Score:2)
Re: (Score:3, Informative)
The only way to know if your operating system has been infected is to be lucky enough to have the bad guys screw up and flood your system with enough bad stuff to affect performance. Even then, plain