Man Challenges 250,000 Strong Botnet and Succeeds
When security officials decide to "go after" computer malware, most conduct their actions from a defensive standpoint. For most of us, finding a way to rid a computer of the malware suffices -- but for one computer researcher, however, the change from a defensive to an offensive mentality is what ended the two year chase of a sinister botnet once and for all.
For two years, Atif Mushtaq had been keeping the notorious Mega-D bot malware from infecting computer networks. As of this past November, Mega-D had forced more than 250,000 PCs to do its bidding via botnet control. That's when Mushtaq decided to take a offensive approach.
How Botnets Propagate and Infect Other PCs
The first wave of a botnet attack uses email attachments, web-based offensives and other distribution methods to infect large numbers of PCs with malicious bot programs: usually either through the fault of the computer operator or an exploit in the operating system.
Once a PC is infected, it is referred as a "bot" (as in "robot") and part of the botnet, or "network of software robots." The bots then receive orders from online command and control (C&C) servers. This is where Mr. Mushtaq looked to attack first.
Multiple Botnet C&C Servers
Problems arose, however, because Mega-D boasted a large array of C&C servers. This meant that every bot had been assigned a list of additional web addresses (destinations) if it could not reach its primary command server. (Source: pcworld.com)
Still, Mushtaq had been pursuing the malicious botnet for two years. During that spell, he managed to gather enough information that suggested the whereabouts of the servers. Most were revealed to originate from the United States, with one in Turkey and another in Israel.
Operation: Sever Bot Ties
From there, Mushtaq and his colleagues contacted domain name registrars holding records for the domain names that Mega-D used for its control servers. The idea was that if the pool of domain names was severed, the individual bots could not reach Mega-D-affiliated servers that the overseas Internet Service Providers (ISPs) had declined to take down. (Source: idg.no)
The end result was a mad dash to register previously unregistered web site addresses that Mega-D's controllers listed in the bot programming. A similar tactic was used to control and out-smart the Conficker worm back in March of this year.
The logic here was that Mushtaq and company would pick up these domain names and steer them into "sinkholes" (servers set up to sit quietly and log efforts by Mega-D bots to check in for orders). Using those logs, Mushtaq and friends estimated that the botnet consisted of about 250,000 Mega-D-infected computers. (Source: pcworld.com)
Mega-D a Top Ten Spam Bot for 2009
Was the operation a success? The proof is in the pudding, so to speak.
MessageLabs, a Symantec email security subsidiary, reported that Mega-D had "consistently been in the top 10 spam bots" for the previous year. On November 1, 2009 Mega-D accounted for 11.8 percent of all spam that MessageLabs observed.
Three days later, the efforts of Mushtaq had helped reduce Mega-D's market share of Internet spam to less than 0.1 percent.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.