Bots Used to Facilitate Spam Matt Ziemniak
Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done
Build more complex rules Provide more interaction with snort.conf file and installation Explain how snort works in real-world setting Make both labs snort-related
Phishing Spyware Nigerian scams Child pornography
Loss of employee production Money spent on hardware/software Dissemination of viruses, spyware, and phishing schemes
Open relay mail servers Open HTTP proxies Worms/mass mailers
Find a way to automate the spamming process while remaining anonymous
Short for robot. A computer program that performs a function such as forwarding , responding to newsgroup messages, or searching for information. Source:
Web crawlers/search agents Interacting with online games Monitoring IRC channels Only limited by imagination
Keylogging Denial-of-Service Attacks Identity Theft (hosting spoofed websites) Spread malware GENERATE SPAM!
Internet Relay Chat (IRC) Hyper-Text Transfer Protocol (HTTP) P2P (Peer-to-Peer file sharing)
An online system that allows real-time communications Consists of an IRC server and an IRC client; the connection between the two is called a channel Members join chat rooms to discuss various topics (may be password protected) Can be used for file sharing
Program that interacts with an IRC server in an automated fashion Typically used to monitor a channel when an individual is away from the computer Can be modified by anyone with programming skills (C++, PERL, DELPHI ) IRC has its own scripting language
An individual gains control of many bots that reside on different users’ computers Controlled by a “bot master” who uses a command/control The bots connect to the IRC server and wait for commands from the bot master Bot Master Bot
Commonly used to generate spam User typically visits website and downloads a trojan or other piece of malware Connection is made to a web server operated by a bot master More software is downloaded onto user’s computer
Browser Exploit Trojan Download Bot Client Downloaded
Use compromised computer as spam proxy Use compromised computer as mail relay Obtain addresses from compromised computer (harvesting)
HTTP redirects Path to actual site leads to IP’s across different countries (bouncing) Compromised proxies don’t log connections Tank farms act like middlemen by pushing the spam through proxies
"At the end of last year we knew of about 2,000 botnets. Towards the end of this year, we're looking at about 300,000,". Source: Jesse Villa, Frontbridge Technologies
Gathering intelligence regarding botnet activity Use tools such as honeypots, intrusion detection systems, packet sniffers Perform trends analysis on data, source information, log files (firewall and IDS)
Educate employees Increase security measures Develop security products Share information and resources