Home
Forums
New posts
Search forums
What's new
New posts
New profile posts
Latest activity
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Search forums
Menu
Log in
Register
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Home
Forums
CARDING & HACKING
HOSTING & BOTNET
Dangerous botnets, and what is known about them. Examples of threats.
Message
<blockquote data-quote="Ghosthunter" data-source="post: 514" data-attributes="member: 6"><p><h4>Examples of the most famous botnets in the world</h4><h4>Below are the most extensive criminal botnets that have caused or are causing great damage to both commercial companies and ordinary citizens from countries around the world. The status of whether the network is currently active or not is not described here, as their variations may evolve, change names and directions. Even if one was closed, there is no guarantee that a new one based on it will not appear tomorrow.</h4><p></p><h4>Mirai</h4> <ul> <li data-xf-list-type="ul"><strong>Brief description:</strong> hacking of Internet of Things devices through a vulnerability in the same type of account access</li> <li data-xf-list-type="ul"><strong>Family:</strong> Worms</li> <li data-xf-list-type="ul"><strong>Who's at Risk:</strong> Smart Home Devices (IoT)</li> <li data-xf-list-type="ul"><strong>Application:</strong> DDoS attacks</li> <li data-xf-list-type="ul"><strong>Damage:</strong> ~ $ 100 million</li> </ul><p><strong>Mirai</strong> is a botnet developed by students as a tool for conducting DDoS attacks. Smart household devices were chosen as zombie targets. Its operators found a vulnerability in accessing the administrator account on these devices. It consisted in the fact that the same username and password were set there by default, and the set of combinations for selection was small.</p><p></p><p>The most famous attacks with its help are the attack on the website of journalist Brian Krebs, who recently published an article about earning money on such networks, and on Dyn DNS, the DNS operator in the United States.</p><p>In 2017, one of the operators of Mirai-Daniel Kaye (aka BestBuy) — was caught and convicted first in Germany, where he received a suspended sentence, and then in the UK-with a real term.</p><p></p><h4>Andromeda</h4> <ul> <li data-xf-list-type="ul"><strong>Short description:</strong> spam botnet with malware; theft of credentials (form grabbing), etc.</li> <li data-xf-list-type="ul"><strong>Family:</strong> trojans</li> <li data-xf-list-type="ul"><strong>Who is at risk:</strong> any devices</li> <li data-xf-list-type="ul"><strong>Application:</strong> multiple uses</li> </ul><p>For the first time, the Andromeda network appeared in 2011, but it was remembered for the largest and most destructive attack of 2016. Users received spam emails to their mailbox, and unknowingly installed malware, infecting their device with the virus stuffing.</p><p></p><p>The operation to shut down and stop the spread of Andromeda involved the FBI, Interpol, Europol, Eurojust, the Joint Task Force on Combating Cybercrime and other commercial companies. In 2017, a network of 464 separate botnets was defused. The creator was a resident of the Gomel region (Republic of Belarus) Sergey Yaretz (aka Ar3s).</p><p></p><h4>ZeuS</h4> <ul> <li data-xf-list-type="ul"><strong>Short description:</strong> This botnet is used to steal payment data in online banking</li> <li data-xf-list-type="ul"><strong>Family:</strong> trojans</li> <li data-xf-list-type="ul"><strong>Who is at risk:</strong> PC on all versions of Windows</li> <li data-xf-list-type="ul"><strong>Application:</strong> theft of funds from bank accounts</li> <li data-xf-list-type="ul"><strong>Damage:</strong> more than $ 100 million</li> </ul><p>It is based on a Trojan program that aims to intercept passwords from users ' payment systems. The stolen data is then used to steal funds. ZeuS was developed for all possible versions of Windows OS. It can work without connecting to drivers. The most dangerous thing is that the device can get infected even from a guest account.</p><p>The victims of ZeuS were residents of 196 countries. Different methods of infection were used: e-mail spam, trap links, and for the first time, social networks.</p><p></p><p>The program is embedded in an infected system, steals registration data from an online banking account, and transfers money to the accounts of other similar victims. This is done to hide the bot wizard.</p><p>According to analysts, malicious ZeuS is responsible for 90% of all bank fraud cases in the world.</p><p></p><h4>3ve (Eve)</h4> <ul> <li data-xf-list-type="ul"><strong>Short description:</strong> botnet for ad linking</li> <li data-xf-list-type="ul"><strong>Family:</strong> trojans</li> <li data-xf-list-type="ul"><strong>Who is under threat:</strong> advertisers; PCs</li> <li data-xf-list-type="ul"><strong>Application:</strong> draining advertising budgets</li> <li data-xf-list-type="ul"><strong>Damage:</strong> more than $ 20 million</li> </ul><p>3ve sent out malware that infected computer devices. It was distributed via email spam and pseudo-uploading of content. As soon as the victim's PC was infected with a virus program, commands were sent to the victim to click ads. Since the botnet used its own sites for placement in Google AdSense, first of all, botmasters directed traffic to their own dummy sites to simulate the actions of real users. So they built fake ad networks.</p><p></p><p>Its creators and operators were citizens of Russia and Kazakhstan. The network was exposed, servers and domains were selected, and botmasters (not all of them were found) were brought to justice.</p><p></p><h4>Is there any protection against botnets</h4><p>As you can see, all these malicious networks cause huge damage, and your business is not protected from this in any way. It doesn't matter if they are directed to your website, ads, or email address.</p><p>If there is protection against DDoS attacks — special software that detects bots - then what to do with ads? They don't have such a firewall.</p><p>The Botfaqtor security service uses special algorithms and analyzes your site's traffic based on 100 technical and behavioral parameters. Bots are blocked, and your money remains safe and sound.</p><p></p><h4>Protecting your budget from scammers</h4><p>Save up to 30% of your advertising budget! Block bot-attack on the click fraud of the advertising in Yandex Direct & Google ADS and say goodbye to unfair competitors who spoil you with statistics. Protect your site's position from SEO optimizers who "drown" your site with behavioral cheating.</p></blockquote><p></p>
[QUOTE="Ghosthunter, post: 514, member: 6"] [HEADING=3]Examples of the most famous botnets in the world[/HEADING] [HEADING=3]Below are the most extensive criminal botnets that have caused or are causing great damage to both commercial companies and ordinary citizens from countries around the world. The status of whether the network is currently active or not is not described here, as their variations may evolve, change names and directions. Even if one was closed, there is no guarantee that a new one based on it will not appear tomorrow.[/HEADING] [HEADING=3]Mirai[/HEADING] [LIST] [*][B]Brief description:[/B] hacking of Internet of Things devices through a vulnerability in the same type of account access [*][B]Family:[/B] Worms [*][B]Who's at Risk:[/B] Smart Home Devices (IoT) [*][B]Application:[/B] DDoS attacks [*][B]Damage:[/B] ~ $ 100 million [/LIST] [B]Mirai[/B] is a botnet developed by students as a tool for conducting DDoS attacks. Smart household devices were chosen as zombie targets. Its operators found a vulnerability in accessing the administrator account on these devices. It consisted in the fact that the same username and password were set there by default, and the set of combinations for selection was small. The most famous attacks with its help are the attack on the website of journalist Brian Krebs, who recently published an article about earning money on such networks, and on Dyn DNS, the DNS operator in the United States. In 2017, one of the operators of Mirai-Daniel Kaye (aka BestBuy) — was caught and convicted first in Germany, where he received a suspended sentence, and then in the UK-with a real term. [HEADING=3]Andromeda[/HEADING] [LIST] [*][B]Short description:[/B] spam botnet with malware; theft of credentials (form grabbing), etc. [*][B]Family:[/B] trojans [*][B]Who is at risk:[/B] any devices [*][B]Application:[/B] multiple uses [/LIST] For the first time, the Andromeda network appeared in 2011, but it was remembered for the largest and most destructive attack of 2016. Users received spam emails to their mailbox, and unknowingly installed malware, infecting their device with the virus stuffing. The operation to shut down and stop the spread of Andromeda involved the FBI, Interpol, Europol, Eurojust, the Joint Task Force on Combating Cybercrime and other commercial companies. In 2017, a network of 464 separate botnets was defused. The creator was a resident of the Gomel region (Republic of Belarus) Sergey Yaretz (aka Ar3s). [HEADING=3]ZeuS[/HEADING] [LIST] [*][B]Short description:[/B] This botnet is used to steal payment data in online banking [*][B]Family:[/B] trojans [*][B]Who is at risk:[/B] PC on all versions of Windows [*][B]Application:[/B] theft of funds from bank accounts [*][B]Damage:[/B] more than $ 100 million [/LIST] It is based on a Trojan program that aims to intercept passwords from users ' payment systems. The stolen data is then used to steal funds. ZeuS was developed for all possible versions of Windows OS. It can work without connecting to drivers. The most dangerous thing is that the device can get infected even from a guest account. The victims of ZeuS were residents of 196 countries. Different methods of infection were used: e-mail spam, trap links, and for the first time, social networks. The program is embedded in an infected system, steals registration data from an online banking account, and transfers money to the accounts of other similar victims. This is done to hide the bot wizard. According to analysts, malicious ZeuS is responsible for 90% of all bank fraud cases in the world. [HEADING=3]3ve (Eve)[/HEADING] [LIST] [*][B]Short description:[/B] botnet for ad linking [*][B]Family:[/B] trojans [*][B]Who is under threat:[/B] advertisers; PCs [*][B]Application:[/B] draining advertising budgets [*][B]Damage:[/B] more than $ 20 million [/LIST] 3ve sent out malware that infected computer devices. It was distributed via email spam and pseudo-uploading of content. As soon as the victim's PC was infected with a virus program, commands were sent to the victim to click ads. Since the botnet used its own sites for placement in Google AdSense, first of all, botmasters directed traffic to their own dummy sites to simulate the actions of real users. So they built fake ad networks. Its creators and operators were citizens of Russia and Kazakhstan. The network was exposed, servers and domains were selected, and botmasters (not all of them were found) were brought to justice. [HEADING=3]Is there any protection against botnets[/HEADING] As you can see, all these malicious networks cause huge damage, and your business is not protected from this in any way. It doesn't matter if they are directed to your website, ads, or email address. If there is protection against DDoS attacks — special software that detects bots - then what to do with ads? They don't have such a firewall. The Botfaqtor security service uses special algorithms and analyzes your site's traffic based on 100 technical and behavioral parameters. Bots are blocked, and your money remains safe and sound. [HEADING=3]Protecting your budget from scammers[/HEADING] Save up to 30% of your advertising budget! Block bot-attack on the click fraud of the advertising in Yandex Direct & Google ADS and say goodbye to unfair competitors who spoil you with statistics. Protect your site's position from SEO optimizers who "drown" your site with behavioral cheating. [/QUOTE]
Name
Verification
Post reply
Home
Forums
CARDING & HACKING
HOSTING & BOTNET
Dangerous botnets, and what is known about them. Examples of threats.
Top