FBI vs Botnet

Glaucus

Active Member
Member
Joined
Apr 12, 2005
Messages
4,767
Reaction score
697
DoJ, FBI set up command-and-control servers, take down botnet

Past efforts at killing botnets—the large networks of computers running malicious software to send spam, flood websites with traffic, and steal personal data—have managed to disable the networks by taking down important servers, but they've always stopped short of actually killing the botnet software itself. That's because the companies behind these efforts have no more legal authority to run unauthorized software on users' machines than the botnet owners do—to remove the botnet software would make them just as guilty of hacking as the bad guys are.

The result is that while efforts such as Microsoft's disruption of the Waledac and Rustock botnets were successful, they were far from perfect. These efforts left the malicious software running on the infected PCs—they just removed the command and control servers, the centralized machines that tell the botnet what to do. Should the bot herders regain control of the domain names or IP addresses used by the command-and-control servers, the infected machines will be able to successfully connect to them, and the networks will once again spring into life.

A new Justice Department attack will go some way towards solving that problem, at least for the botnet known as "Coreflood." A federal judge has authorized the non-profit Internet Systems Consortium, working in conjunction with the FBI, to go beyond taking down the command-and-control servers: the ISC has installed its own command-and-control servers. The command the servers are sending? Kill the botnet malware. The servers were swapped out on Tuesday evening, and the kill command was duly sent.
I have to say, I think that's great. The malware situation has gone completely out of control, this might be the only way to get a grip on it.
 
I have to say, I think that's great.

I don't know if I'd say I think it's great. Though it's pretty amusing that you can use the command structure of the malware to instruct it to remove itself. :D

But overall, it makes me vaguely uneasy. I think it kind of sends the wrong message. "Don't worry about security -- we'll clean it up for you." I think we need more incentives for people to worry about security, not less. I'd probably be happier if they just ran the command server as a honeypot and notified the owners of all IP addresses who tried to connect to it that their computers are infected.

However, all that said... The "tear-down" instruction hack is probably the most effective way to reduce the malware population out there. And I AM DEFINITELY in favor of that!
 
Back
Top