Botnets 'the Swiss Army knife of attack tools'
Hacker militias can turn to botnets for instant cyberattacks
Computerworld - Hacker militias reach for the closest tool at hand -- botnets already up and running, already reaping ill-gotten gains -- when they mobilize to attack the information infrastructure of other countries, security experts say.
"They just pick up what they use every day," said Joe Stewart, director of malware analysis at SecureWorks Inc. and a noted botnet researcher. "[Militias] don't have much time to ramp up, just days, so it has to be something already in use."
Although militias may be at the bottom of the cyberwar food chain, that doesn't mean they haven't caused chaos. Researchers believe that in 2008, Russian hackers marshaled a force of previously compromised computers -- one or more botnets -- to carry out distributed denial-of-service attacks (DDoS) that knocked offline many of the Web sites in the former Soviet republic of Georgia. At the time, military forces from Georgia and Russia were fighting over disputed territory.
DDoS attacks flood sites with so many spurious requests that the sites' servers are overwhelmed and can't handle legitimate requests, are knocked offline, or are taken offline by the hosting firm or Internet provider.
According to Stewart and other researchers, one of the botnets drafted for the brief cyberskirmish was Black Energy, a Trojan horse-hijacked army of PCs thought to have been used to hit Citibank last year. Since then, Stewart has identified its successor, Black Energy 2, which he said is currently being used to launch DDoS attacks against Russian banks. Stewart speculated that the criminals behind Black Energy 2 attack the banks' Web sites to distract security teams as online accounts are pillaged, much like a criminal crew might stage a fire to distract police from a bank robbery across town.
Black Energy 2 could be the weapon Russian militias reach for next time.
"Botnets are the Swiss Army knife of attack tools," said Marc Fossi, manager of research and development for Symantec Corp.'s security response team. "Hackers use them to relay spam, for phishing and to post Web-based attacks or malcode. They're the engine that drives criminal activity on the Internet."
DDoS attacks are the "blunt end of what they can do," Fossi added.
- After Google-China dust-up, cyberwar emerges as a threat
- Targeted attacks test enterprise security controls
- Is the U.S. the nation most vulnerable to cyberattack?
- In cyberwar, who's in charge?
- Schmidt: Private sector key to stopping Google-style attacks
- Threat of cyberattacks from overseas high, federal IT execs say
- Estonia readies for the next cyberattack
- Think tank in Estonia ponders war in cyberspace
- Botnets 'the Swiss Army knife of attack tools'
- 'Cyber War' author: U.S. needs radical changes to protect against attacks
- Special report: Web giants attacked
- EndPoint Interactive eGuide In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!