Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Good Guys Bring Down the Mega-D Botnet
PC World ^ | Dec 27, 2009 | Erik Larkin

Posted on 12/29/2009 8:58:34 PM PST by nickcarraway

Chalk up one for the defenders. Here’s how a trio of security researchers used a three-step attack to defeat a 250,000-pronged botnet.

For two years as a researcher with security company FireEye, Atif Mushtaq worked to keep Mega-D bot malware from infecting clients' networks. In the process, he learned how its controllers operated it. Last June, he began publishing his findings online. In November, he suddenly switched from de fense to offense. And Mega-D--a powerful, resilient botnet that had forced 250,000 PCs to do its bidding--went down.

Mushtaq and two FireEye colleagues went after Mega-D's command infrastructure. A botnet's first wave of attack uses e-mail attachments, Web-based offensives, and other distribution methods to infect huge numbers of PCs with malicious bot programs.

The bots receive marching orders from online command and control (C&C) servers, but those servers are the botnet's Achilles' heel: Isolate them, and the undirected bots will sit idle. Mega-D's controllers used a far-flung array of C&C servers, however, and every bot in its army had been assigned a list of additional destinations to try if it couldn't reach its primary command server. So taking down Mega-D would require a carefully coordinated attack.

Synchronized Assault Mushtaq's team first contacted Internet service providers that unwittingly hosted Mega-D control servers; his research showed that most of the servers were based in the United States, with one in Turkey and another in Israel.

The FireEye group received positive responses except from the overseas ISPs. The domestic C&C servers went down.

Next, Mushtaq and company contacted domain-name registrars holding records for the domain names that Mega-D used for its control servers. The registrars collaborated with FireEye to point Mega-D's existing domain names to no where.

(Excerpt) Read more at pcworld.com ...


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: botnets; cybercrime; hacking; internet; internetsecurity; malware; spam

1 posted on 12/29/2009 8:58:35 PM PST by nickcarraway
[ Post Reply | Private Reply | View Replies]

To: ShadowAce

Ping


2 posted on 12/29/2009 8:59:49 PM PST by nickcarraway
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

Give that man a medal!


3 posted on 12/29/2009 9:04:47 PM PST by smokingfrog (Don't mess with the mocking bird! - http://tiny.cc/freepthis)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

ka-pow!!

too bad for the bad guys that Obama can’t surrender the domain name stuff to the UN.... heh... or can he?


4 posted on 12/29/2009 9:05:55 PM PST by GeronL (http://libertyfic.proboards,com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

“he suddenly switched from defense to offense”

Great success story, very interesting — thanks for posting it.

The best defense is an offense, as they say.


5 posted on 12/29/2009 9:47:41 PM PST by SmartInsight (Dems in power are a clear and present danger to our freedom and our survival)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway
From Symantec:


6 posted on 12/29/2009 9:52:53 PM PST by TChad
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

Go Tron, Go


7 posted on 12/29/2009 10:07:04 PM PST by art_rocks
[ Post Reply | Private Reply | To 1 | View Replies]

To: Interesting Times

Good guys ping.


8 posted on 12/29/2009 10:32:27 PM PST by zot
[ Post Reply | Private Reply | To 4 | View Replies]

To: zot

That’s really nice work.

I hope these guys continue to shoot down botnets as they uncover them.


9 posted on 12/29/2009 10:39:22 PM PST by Interesting Times (For the truth about "swift boating" see ToSetTheRecordStraight.com)
[ Post Reply | Private Reply | To 8 | View Replies]

To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...

10 posted on 12/30/2009 7:48:41 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

That’s slick as snot! These guys are geniuses, and they prove that the good guys aren’t always from the government!

To take down a botnet with that many infested clients is awesome, but it doesn’t account for 250,000 potentially infect-able clients still floating out there.


11 posted on 12/30/2009 1:58:56 PM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway; Ernest_at_the_Beach
For some Dam reason my ISP must have the worlds greatest spam filter ever devised. I don't even get a eBay or Pay Pal phising expedition since they bought out Cox Cable...
12 posted on 12/30/2009 5:55:12 PM PST by tubebender (Some minds are like concrete Thoroughly mixed up and permanently set...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: tubebender
Well,...I feel bad for you...LOL!

I don't think I get such stuff either.

13 posted on 12/30/2009 6:24:10 PM PST by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 12 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson