3. Botnets Flashcards

1
Q

What are bots/ botnets?

A

Bots: A bot is piece of malicious software with remote control capabilities
Botnet: A network of computers infected with a bot. The bot is controlled by C&C (Command and Control) Infrastructure. The attacker, which controls the botnet is called herder. The infected computer is called a zombie or drone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are attacks mounted with the help of botnets?

A

-Distributing spam and phishing emails
-Mounting distributed denial of service (DDoS) attacks
-Conducting data theft with the help of spyware like key
loggers, webcam recording capabilities…
-Conducting click-fraud
-Spreading new malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the life-cycle of a bot from a herder point of view?

A

-Creation: Development of the botnet software often reusing existing code
Infection: via Software vulnerabilities, drive-by-downloads,
Trojan horses, email attachments,…
Rallying: Bots start up for the first time and attempt to contact the C&C server(s)
- Centralized: join IRC channel, connect to HTTP server
- Decentralized: bootstrapping protocol to detect other peers in the P2P
network
Waiting: Bots wait for commands from the botmaster through C&C
infrastructure
Executing: Bots execute commands received through the C&C
infrastructure
-E.g. scanning for new victims, downloading updates, sending DoS floods,….

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the life-cycle of a bot from a defense point of view?

A

-Detection
-Capturring
-Analysis
-Tear Down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the C&C techniques?

A

Centralized:
- IRC (Internet Relay Chat)
- HTTP
Decentralized:
- P2P (Usually hybrid)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is a centralized botnet taken down?

A

-Locate C&C Server and take them down:
- Analyze network traffic of bots
-Make C&C Server unreachable
- Block DNS/ IP range
-**Find out which devices in your network are infected
-Use Sinkhole with DNS entry and see who connects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is the IP of a C&C Server hidden?

A

Domain Generating Algorithms (DGAs):
- Use a seed to generate domain names and query them
- Most domains are not registered, but some are
Fast Flux in DNS
- Multiple IP addresses on a single DNS record, cahnged quickly
- No one server to take down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is a P2P botnet taken down?

A
  • More difficult then centralized Botnets, no simple solution
  • Ultimately requires desinfection off all infected nodes
  • If commands are not signed correctly: Command bots with cleanup tool
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to track down botnet herders?

A
  • No general method, dependend on C&C type
  • Put network taps on C&C Server
  • Social engineering: Pretend to be potential buyer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Roles in organzied crime with Botnets

A
  • Exploit Developers: Looks for exploits to infect computers
  • Malware Programmers: Develop C&C server and bot client
  • Botnet Herders: Operates the botnet and rents/ sells control
  • Bot Users: Uses botnet to mount an actual attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is money made from Botnets?

A

Stealing Information
- Selling bank account
- Selling identity information
Ransomware
DDOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What was the Mirai Botnet and how did it work?

A
  • IoT Botnet with centralized C&C
  • Infected DVRs, routers, IP cameras etc. with misconfigured ports or default credentials
  • Used to DDOS e.g. OVH.com
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Stuxnet and how did it work?

A
  • Targeted attack against SCADA networks, likely by intelligence organization
  • Worm with C&C Server for updates
  • Used 3 zero day exploits to infect Windows machines and looks for SCADA software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly