Quick review of the top botnets
Date : June 05, 2008
While monitoring IT web sites media we frequently read articles announcing that a new "botnet" was discovered, and that its power exceeds previously known contenders. "Storm", "Stration", "Mega-D" are examples of the botnets that jostle on the front of the scene. In this article we make a quick review of these "top" botnets.
Botnet architecture
When
considering their architectures there are two types of botnets:
- The botnets that use a central server to control the bots.
- The botnets that use a
"Peer to Peer" (P2P) architectural model.
Note: The word "bot" is the contraction of the word "robot". We will use this terminology in the rest of this article as its use is common when talking about botnet.
Botnets
with a central server
This first
type of architecture is the most common. Compromised machines (which run the
"bots") are often controlled by a set of servers (instead of a unique
server). Typically, when a bot starts, it attempts to contact a set of servers (the
list of servers is often hardcoded). The first server that answers to these
queries becomes the "commander" (master) and the bot becomes the
slave. It will obey to the commands
received from the master.
To
neutralize this kind of "botnet" you have therefore "just" to
shutdown the master servers.
Note: Some
authors (see [1]) identify two sub-families for this architecture to
differentiate the case where the central server is an IRC server (that
constitutes the first sub-family) to the other cases (that constitutes the
second sub-family) .
Peer to Peer Botnets
This second
type of architecture is more recent (2006). It uses a "Peer to Peer" model
that is a meshed network without any central
servers. Each "bot" communicates with its neighbouring "bots"
and does not know about the rest of the network. The hacker who controls the
botnet (the "bot herder") and transmits orders to one of the "bots"
(it does not matter which bot it is). Any order will then spread across the entire
network (each "bot" receiving the order forwards it to its neighbours).
The advantage of this approach is that it is very difficult to neutralize such botnets
because it requires to shutdown all the machines part of the botnet.
There is currently few P2P botnets, including : Storm, Nugache, SpamThru and Mayday. Several analysts explain that the P2P architecture is not worth the effort : it is complex to implement and regarding the lifetime cycle a classical "botnet" (centralised architecture) survives, the level of sophistication of the P2P seems unnecessary.
Botnet usages
There is
a very large number of working "botnets" on Internet because today most
of the viruses install a "bot" on the system they infect. These botnets
are used to :
- send SPAM. SPAM "botnets" are run by "organisations" which make SPAM as a business. They are professional.
- perform DDoS attacks. You can find in that category large botnets operated by professionals (like for SPAM) or other botnets run by individuals (e.g. "script kiddies").
Of course the same "botnet" could be used for both the SPAM and the DDoS purposes.
The list of the top spam botnets
The biggest
"botnets" are those used to send SPAM. We list here the best-known
botnets, and uses a study published by SecureWorks (see [2]) to assess "botnets"
powers. Unless otherwise stated, all these botnets use the "central server"
architecture.
Srizbi: Since February 2008 Srizbi is the most
powerful SPAM known botnet. It has been estimated that this botnet is composed
of about 315 000 compromised machines (bots) and has the ability to send around
60 billion spam messages per day. From a technical point of view, Srizbi is famous
because of the high level of sophistication of its "rootkit" module which
makes it stealthy on infected machines.
Rustock: Estimated size: 150 000 bots / 30 billion
emails per day.
This
"bot" was originally specialized in "pump-and-dump" SPAM (SPAM
which tries to influence the stock exchange market of cheap shares by
convincing spammed recipients to buy shares).
Kraken and Bobax: Estimated size: 185 000 bots / 9 billion
emails per day.
"Bobax"
is one of the oldest spam botnets. It recently mutates into "Kraken".
Storm: Estimated size: 85 000 bots / 3 billion emails
per day.
This botnet
uses a "P2P" model, which makes it very difficult to shutdown. Storm
(also known as "Storm Worm" or "Zhelatin") has sparked very
long debates throughout the year 2007 because of its estimated size and because
of its P2P model. It had been stated that 50 million systems had been infected during
the summer 2007, but it had been denied later).
Mega-D (Ozdok): Estimated size: 35 000 bots / 10 billion
emails per day.
The botnet
was most virulent in January 2008, but its activity slowed down sharply in
February. According to some sources this slowdown is voluntary and aims at
avoiding attracting to much attention.
Stration: This botnet was widespread at the end of 2006, but it seems to have disappeared since then. It has often been considered as the main competitor of "Storm". It is worth to mention that botnets may target each others, this the case of "Storm" which is known to have launched denial of service attacks (DDoS) against systems hosting "Stration".
For more information:
- [1] "Command
and control structure in malware":
http://www.sagecertification.org/publications/login/2007-12/openpdfs/dittrich.pdf - [2] "Top
Spam Botnets Exposed":
http://www.secureworks.com/research/threats/topbotnets/ - [3] "Peer-to-Peer
Botnets: Overview and Case Study "
http://www.usenix.org/event/hotbots07/tech/full_papers/grizzard/grizzard.pdf - [4] "The
botnet business":
http://www.viruslist.com/en/analysis?pubid=204792003 - [5] SPAM Statistics
published by Marshal.com:
http://www.marshal.com/trace/spam_statistics.asp