Main » 2011 » Март » 16 » The market leader captured botnet sdbot and gaobot
14:01
The market leader captured botnet sdbot and gaobot
In the hacking competition for the maximum number of zombie PCs controlled by leaders bots Sdbot and Gaobot. As reported by antivirus company PandaLabs, the two specified bot responsible for 80% of all new infections in the I quarter. 2007. With a large gap from the leaders follow Oscarbot, IRCbot and RXbot.

"The reasons for this dominance lie not so much in any special properties of Gaobot or Sdbot, but simply that their code is the most prevalent on the Internet - explains Luis Corrons, technical director of PandaLabs. - This means that any criminal who wants to make a bot can simply take the source code for these threats and make any changes of your choice. Indeed through this saves them time and effort. "

Bots - it's worms or Trojans that install themselves on computers to automatically perform certain actions such as sending spam, and then turn computers into "zombies." Botnets - networks of computers infected with bots have become a lucrative business model. There is an underground market of delivery boats for rent, for example, to send spam or install spyware and adware.

In 2006, bots accounted for 13% of the total number of new threats detected by PandaLabs, and 74% of them belonged to the Sdbot and Gaobot.

As the number of boats is growing and changing ways of their control. Until now, the bots were controlled through IRC-servers. Through them the attackers to send orders while hiding behind the anonymity of chat servers. However, now there are bots that can be controlled via the web console using HTTP.

«Control through IRC is useful for controlling isolated computers. However, such a system is not very effective against botnets. Through the use of HTTP bot-herder can simultaneously manage many computers can even keep track of which of them is in online mode, and whether the commands are executed, "- says Luis Corrons.

Bots are most likely to be in computers with e-mail or through system vulnerabilities. The main purpose - quietly installed and continue their activities for a long time without revealing its presence.

Via PandaLab
Views: 720 | Added by: w1zard | Rating: 0.0/0
Total comments: 0
Имя *:
Email *:
Код *: