SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
WHAT IS BOTNET?
Milan Petrásek
21/5/2014
Content
• Introduction
• Star and multiserver topology botnets
• Hierarchical topology botnets
• Random topology botnets
• Types of attacks
• Famous botnets through history
• Summary
Intro - terms
BOT or „zombie“. Short for roBOT.
NET short for interNET
Botnet a lot of infected computers
Bot Herder or „bot master“ can control
the botnet remotely
C&C Server command-and-control centre
for botnet managing
Star and multiserver
topology
Hierarchical topology
Random topology
Types of attacks
• Distributed denial-of-service (DDoS)
• Adware advertises
• Spyware
• E-mail
• Click fraud
• Fast flux
• Brute-forcing remote machines services
• Worms
• Scareware
• Exploiting systems
Famous botnets through history
• 2001 – First Botnet
(http://www.bizjournals.com/atlanta/stories/2002/07/22/story4.html?p
age=all)
• 2005 Torpig
• 2006 Virut
• 2007 Zeus – one of the biggest (compromised U.S. computers: 3.6
million)
• 2007 Storm
• 2008 Conficker
• 2008 Grum
• 2008 Lethic
• 2008 Mariposa
• 2009 SpyEye
• 2010 Waledac
• 2011 ZeroAccess
• 2012 FlashFake (Mac OS X)
• 2012 Jeef
• 2012 Smoke
Summary
• Botnets are serious problem today
– Malware as a Service
• Bleak future awaiting us
– Mobile botnets on the rise
– Internet of Things botnets
IoT BotnetInternet of Things botnets
In December 2013 a researcher at Proofpoint noticed that hundreds of thousands of malicious
emails logged through a security gateway had originated from botnet that included not only
computers, but also other devices – including SmartTV, a refrigerator and other household
appliances.
IoT worm used to mine cryptocurrency – worm Linux.Darlloz
http://www.symantec.com/connect/blogs/iot-worm-used-mine-
cryptocurrency
Infecting DVRs with Bitcoin-mining malware even easier than you
suspected
http://arstechnica.com/security/2014/05/infecting-dvrs-with-
bitcoin-mining-malware-even-easier-you-suspected/
QUESTIONS?
Resources
• http://en.wikipedia.org/wiki/Botnet
• http://www.welivesecurity.com/2011/06/27/tdl-tracking-peer-pressure/
• http://www.abuse.ch/?p=3499
• http://www.securelist.com/en/analysis/204792227/The_anatomy_of_Fl
ashfake_Part_1
• http://www.networkworld.com/news/2009/072209-botnets.html
• Fortinet – White Paper: „Anatomy of a Botnet“
• Fortinet – 2013 Cybercrime Report
• Gunter Ollmann, VP of Research, Damballa Inc. – Botnet Communication
Topologies

Weitere ähnliche Inhalte

Was ist angesagt?

Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
Anushakp9
 
Proxy servers
Proxy serversProxy servers
Proxy servers
Kumar
 
Final Project Report-SIEM
Final Project Report-SIEMFinal Project Report-SIEM
Final Project Report-SIEM
Rangan Yoga
 

Was ist angesagt? (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Botnet
Botnet Botnet
Botnet
 
Ransomware
RansomwareRansomware
Ransomware
 
What is malware
What is malwareWhat is malware
What is malware
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
introduction to Botnet
introduction to Botnetintroduction to Botnet
introduction to Botnet
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Ceh v5 module 14 sql injection
Ceh v5 module 14 sql injectionCeh v5 module 14 sql injection
Ceh v5 module 14 sql injection
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
Ransomware
RansomwareRansomware
Ransomware
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Proxy servers
Proxy serversProxy servers
Proxy servers
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Final Project Report-SIEM
Final Project Report-SIEMFinal Project Report-SIEM
Final Project Report-SIEM
 
Cyber security
Cyber securityCyber security
Cyber security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 

Ähnlich wie What is botnet?

A short visit to the bot zoo
A short visit to the bot zooA short visit to the bot zoo
A short visit to the bot zoo
UltraUploader
 

Ähnlich wie What is botnet? (20)

Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
 
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
[2010 CodeEngn Conference 04] Max - Fighting against Botnet[2010 CodeEngn Conference 04] Max - Fighting against Botnet
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
 
Fear, Uncertainty and Doubt
Fear, Uncertainty and DoubtFear, Uncertainty and Doubt
Fear, Uncertainty and Doubt
 
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
 
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)
 
BOTLAB excersise
BOTLAB excersiseBOTLAB excersise
BOTLAB excersise
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Botnets In Cyber Security
Botnets In Cyber SecurityBotnets In Cyber Security
Botnets In Cyber Security
 
BotNet Attacks
BotNet AttacksBotNet Attacks
BotNet Attacks
 
Botnet
BotnetBotnet
Botnet
 
Bots and Botnet
Bots and BotnetBots and Botnet
Bots and Botnet
 
All you know about Botnet
All you know about BotnetAll you know about Botnet
All you know about Botnet
 
Botnet.pptx
Botnet.pptxBotnet.pptx
Botnet.pptx
 
botnet.ppt
botnet.pptbotnet.ppt
botnet.ppt
 
098
098098
098
 
A short visit to the bot zoo
A short visit to the bot zooA short visit to the bot zoo
A short visit to the bot zoo
 
News Bytes - May 2015
News Bytes - May 2015News Bytes - May 2015
News Bytes - May 2015
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
PyMultitor
PyMultitorPyMultitor
PyMultitor
 
Aleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS AttacksAleksei zaitchenkov slides about DOS Attacks
Aleksei zaitchenkov slides about DOS Attacks
 

Mehr von Milan Petrásek

Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
Milan Petrásek
 
GTS platforma pro vyvojáře webexpo 2012
GTS platforma pro vyvojáře webexpo 2012GTS platforma pro vyvojáře webexpo 2012
GTS platforma pro vyvojáře webexpo 2012
Milan Petrásek
 
Článek z CIO Business World
Článek z CIO Business WorldČlánek z CIO Business World
Článek z CIO Business World
Milan Petrásek
 

Mehr von Milan Petrásek (14)

O2 Firewally nové generace
O2 Firewally nové generaceO2 Firewally nové generace
O2 Firewally nové generace
 
Bezpečná firma - koncepce GTS
Bezpečná firma - koncepce GTSBezpečná firma - koncepce GTS
Bezpečná firma - koncepce GTS
 
HighEnd a Mainframe procesory Itanium, SPARC, POWER
HighEnd a Mainframe procesory Itanium, SPARC, POWERHighEnd a Mainframe procesory Itanium, SPARC, POWER
HighEnd a Mainframe procesory Itanium, SPARC, POWER
 
DDoS ochrana pro setkání CSIRT.CZ
DDoS ochrana pro setkání CSIRT.CZDDoS ochrana pro setkání CSIRT.CZ
DDoS ochrana pro setkání CSIRT.CZ
 
DDoS
DDoSDDoS
DDoS
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
 
High Frequency Trading
High Frequency TradingHigh Frequency Trading
High Frequency Trading
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
 
GTS platforma pro vyvojáře webexpo 2012
GTS platforma pro vyvojáře webexpo 2012GTS platforma pro vyvojáře webexpo 2012
GTS platforma pro vyvojáře webexpo 2012
 
Cloudové služby GTS
Cloudové služby GTSCloudové služby GTS
Cloudové služby GTS
 
Gts produkty pro Business Continuity Mgmt.
Gts produkty pro Business Continuity Mgmt.Gts produkty pro Business Continuity Mgmt.
Gts produkty pro Business Continuity Mgmt.
 
Článek z CIO Business World
Článek z CIO Business WorldČlánek z CIO Business World
Článek z CIO Business World
 
GTS Data Storage CZ
GTS Data Storage CZGTS Data Storage CZ
GTS Data Storage CZ
 
TCO for a cloud
TCO for a cloudTCO for a cloud
TCO for a cloud
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

What is botnet?

  • 1. WHAT IS BOTNET? Milan Petrásek 21/5/2014
  • 2.
  • 3. Content • Introduction • Star and multiserver topology botnets • Hierarchical topology botnets • Random topology botnets • Types of attacks • Famous botnets through history • Summary
  • 4. Intro - terms BOT or „zombie“. Short for roBOT. NET short for interNET Botnet a lot of infected computers Bot Herder or „bot master“ can control the botnet remotely C&C Server command-and-control centre for botnet managing
  • 8. Types of attacks • Distributed denial-of-service (DDoS) • Adware advertises • Spyware • E-mail • Click fraud • Fast flux • Brute-forcing remote machines services • Worms • Scareware • Exploiting systems
  • 9. Famous botnets through history • 2001 – First Botnet (http://www.bizjournals.com/atlanta/stories/2002/07/22/story4.html?p age=all) • 2005 Torpig • 2006 Virut • 2007 Zeus – one of the biggest (compromised U.S. computers: 3.6 million) • 2007 Storm • 2008 Conficker • 2008 Grum • 2008 Lethic • 2008 Mariposa • 2009 SpyEye • 2010 Waledac • 2011 ZeroAccess • 2012 FlashFake (Mac OS X) • 2012 Jeef • 2012 Smoke
  • 10. Summary • Botnets are serious problem today – Malware as a Service • Bleak future awaiting us – Mobile botnets on the rise – Internet of Things botnets
  • 11. IoT BotnetInternet of Things botnets In December 2013 a researcher at Proofpoint noticed that hundreds of thousands of malicious emails logged through a security gateway had originated from botnet that included not only computers, but also other devices – including SmartTV, a refrigerator and other household appliances. IoT worm used to mine cryptocurrency – worm Linux.Darlloz http://www.symantec.com/connect/blogs/iot-worm-used-mine- cryptocurrency Infecting DVRs with Bitcoin-mining malware even easier than you suspected http://arstechnica.com/security/2014/05/infecting-dvrs-with- bitcoin-mining-malware-even-easier-you-suspected/
  • 13. Resources • http://en.wikipedia.org/wiki/Botnet • http://www.welivesecurity.com/2011/06/27/tdl-tracking-peer-pressure/ • http://www.abuse.ch/?p=3499 • http://www.securelist.com/en/analysis/204792227/The_anatomy_of_Fl ashfake_Part_1 • http://www.networkworld.com/news/2009/072209-botnets.html • Fortinet – White Paper: „Anatomy of a Botnet“ • Fortinet – 2013 Cybercrime Report • Gunter Ollmann, VP of Research, Damballa Inc. – Botnet Communication Topologies