Your Botnet is My Botnet: Analysis of a Botnet Takeover

Status
Not open for further replies.

office politics

It's all just 1s and 0s
Messages
6,555
Location
in the lab
Your Botnet is My Botnet: Analysis of a Botnet Takeover
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski,
Richard Kemmerer, Chris Kruegel, Giovanni Vigna
Security Group
Department of Computer Science
University of California, Santa Barbara
[bstone,marco,sullivan,rgilbert,msz,kemm,chris,vigna]@cs.ucsb.edu

ABSTRACT
Botnets, networks of malware-infected machines that are controlled
by an adversary, are the root cause of a large number of security
threats on the Internet. A particularly sophisticated and insidious
type of bot is Torpig, a malware program that is designed to harvest
sensitive information (such as bank account and credit card
data) from its victims. In this paper, we report on our efforts to
take control of the Torpig botnet for ten days. Over this period,
we observed more than 180 thousand infections and recorded more
than 70 GB of data that the bots collected. While botnets have been
“hijacked” before, the Torpig botnet exhibits certain properties that
make the analysis of the data particularly interesting. First, it is possible
(with reasonable accuracy) to identify unique bot infections
and relate that number to the more than 1.2 million IP addresses
that contacted our command and control server. This shows that
botnet estimates that are based on IP addresses are likely to report
inflated numbers. Second, the Torpig botnet is large, targets a variety
of applications, and gathers a rich and diverse set of information
from the infected victims. This opens the possibility to perform interesting
data analysis that goes well beyond simply counting the
number of stolen credit cards.
 
Status
Not open for further replies.
Back
Top Bottom