3. Content
• Introduction
• Star and multiserver topology botnets
• Hierarchical topology botnets
• Random topology botnets
• Types of attacks
• Famous botnets through history
• Summary
4. Intro - terms
BOT or „zombie“. Short for roBOT.
NET short for interNET
Botnet a lot of infected computers
Bot Herder or „bot master“ can control
the botnet remotely
C&C Server command-and-control centre
for botnet managing
9. Famous botnets through history
• 2001 – First Botnet
(http://www.bizjournals.com/atlanta/stories/2002/07/22/story4.html?p
age=all)
• 2005 Torpig
• 2006 Virut
• 2007 Zeus – one of the biggest (compromised U.S. computers: 3.6
million)
• 2007 Storm
• 2008 Conficker
• 2008 Grum
• 2008 Lethic
• 2008 Mariposa
• 2009 SpyEye
• 2010 Waledac
• 2011 ZeroAccess
• 2012 FlashFake (Mac OS X)
• 2012 Jeef
• 2012 Smoke
10. Summary
• Botnets are serious problem today
– Malware as a Service
• Bleak future awaiting us
– Mobile botnets on the rise
– Internet of Things botnets
11. IoT BotnetInternet of Things botnets
In December 2013 a researcher at Proofpoint noticed that hundreds of thousands of malicious
emails logged through a security gateway had originated from botnet that included not only
computers, but also other devices – including SmartTV, a refrigerator and other household
appliances.
IoT worm used to mine cryptocurrency – worm Linux.Darlloz
http://www.symantec.com/connect/blogs/iot-worm-used-mine-
cryptocurrency
Infecting DVRs with Bitcoin-mining malware even easier than you
suspected
http://arstechnica.com/security/2014/05/infecting-dvrs-with-
bitcoin-mining-malware-even-easier-you-suspected/