427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet58/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   54   55   56   57   58   59   60   61   ...   387
Bog'liq
Botnets - The killer web applications

W
ARNING
Piracy can lead to felony convictions and seizure of property. Table 2.2
lists defendants who have been convicted of various piracy-related
offenses.
Table 2.2
Piracy Felons
Warez Group 
Conviction 
Defendant
Nickname
Affiliations Date
Offense
SANKUS, John, Jr.
eriFlleH
DrinkOr Die, Harm Felony
Conspiracy
Philadelphia, PA.
Feb. 27, 2002
ERICKSON, Barry
Radsl
RiscISO, 
Felony
Conspiracy
Eugene, OR
DrinkOrDie, POPZ May 2, 2002
GRIMES, David A.
Chevelle
DrinkOrDie, RISC, Felony
Conspiracy
Arlington, TX
RTS
March 4, 2002
NAWARA, Stacey
Avec
RTS, Razor1911, 
Felony
Conspiracy
Rosenberg, TX
DrinkOrDie
March 19, 2002
HUNT, Nathan
Azide
CORPS, 
Felony
Conspiracy
Waterford, PA
DrinkOrDie
April 3, 2002
PATTANAYEK, Sabuj Buj
DrinkOrDie, 
Felony
Conspiracy
Durham, NC
CORPS, RTS
April 11, 2002
KELLY, Michael
Erupt
RiSC, AMNESiA, 
Felony
Conspiracy
Miami, FL
CORE, DrinkOrDie April 10, 2002
CLARDY, Andrew
Doodad
POPZ, DrinkOrDie Felony
Criminal copy-
Galesburg, IL
April 4, 2002
right infringe-
ment and aiding
and abetting
www.syngress.com
Botnets Overview • Chapter 2
59
Continued
427_Botnet_02.qxd 1/9/07 9:49 AM Page 59


Table 2.2 continued
Piracy Felons
Warez Group 
Conviction 
Defendant
Nickname
Affiliations Date
Offense
TRESCO, Christopher BigRar
RiSC, DrinkorDie
Felony
Conspiracy
Boston, MA
May 28, 2002
EISER, Derek
Psychod
DrinkOrDie
Felony
Criminal
Philadelphia, PA
June 21, 2002
Copyright
Infringement
NGUYEN, Mike
Hackrat
Razor1911, RISC
Felony
Conspiracy
Los Angeles, CA
Jan. 31, 2002
KARTADINATA, Kent Tenkuken
DrinkOrDie
Felony
Conspiracy
Los Angeles, CA
Jan. 31, 2002
BERRY, Richard
Flood
POPZ, DrinkOrDie Felony
Conspiracy
Rockville, MD
Apr. 29, 2002
RIFFE, John
blue
SMR, EXODUS
Felony
Criminal
Port St. John, FL
May 9, 2002
Copyright
Infringement
GROSS, Robert
target-
DrinkOrDie
Felony
Criminal
Horsham, PA
practice
May 22, 2002
Copyright
Infringement
COLE, Myron
t3rminal
DrinkOrDie
Felony
Criminal
Warminster, PA
July 10, 2002
Copyright
Infringement
BUCHANAN, spaceace
POPZ, 
DrinkOrDie Felony
Criminal 
Anthony
August 19, 2002 Copyright 
Eugene, OR
Infringement
Ransomware
As a category this includes any of the ways that hackers may hold a person’s
computer or information hostage. Ransomware, for this book, includes using
a botnet to DDoS a computer or a company until a ransom is paid to make
the DOS stop.The hacker may use Paypal or Western Union to arrange for
difficult-to-trace money transactions. When a botnet handler realizes they
have a computer that might be worth ransoming, they can encrypt important
files and demand a ransom for the key and/or software to decrypt them. Last
www.syngress.com
60
Chapter 2 • Botnets Overview
427_Botnet_02.qxd 1/9/07 9:49 AM Page 60


year a DDoS ransom attack was launched to target 180Solutions(now known
as Zango), a spyware company that tried to go legit. 180Solutions terminated
over 500 of the company’s affiliates due to their practice of installing the
company’s adware without the knowledge of the user. One group of affiliates
used the same botnet that had been installing the adware to launch their
DDoS attack.The company responded by contacting the FBI. With the FBI’s
help they tracked down the operators of the botnet in several countries
around the world. Once the attackers were known, 180Solutions filed a civil
suit against the seven hackers involved in the DDoS attacks.
Data Mining
The final payload type we will cover is data mining.This can be added to any
of the other types of functionality pertaining to botnet clients. For this, the
botherder employs tools to gather information from each of the botnet clients
or their users.They will at a minimum enumerate the users of the computer
and note which accounts have local administrator accounts.They may collect
the Security Accounts Manager (SAM) database or any password cache
storage to be broken. Breaking these passwords may take place on the client
or the information may be reformatted and sent to another computer to have
a password cracking program run against it.
The botnet client can be searched for numbers that look like credit card
numbers or Social Security Account Numbers (SSANs). Credit card and
SSAN information can be sold on special Web sites established for that pur-
pose. Some botnets establish keylogger programs that record every keystroke
taken on the computer. Later, userIDs and passwords can be harvested from
the logs. Recent malicious code has been very precisely targeted. Code has
been found that piggybacks a legitimate user as they login to an e-Gold
account. Once in, they initiate an electronic funds transfer and siphon off the
user’s money.
Reporting Results
Using the Command and Control mechanism, the botclient would report
results (when appropriate) back to the C&C server or to a location directed
by the commands from the botherder. For some of these payloads (spamming,

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   54   55   56   57   58   59   60   61   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish