A couple of weeks ago a team at the University of California Santa Barbara managed to take over a botnet for ten days. Their fascinating and well-written analysis is well worth reading for an objective and first-hand look at how a botnet really operates.
So how did they do it? A botnet is just the overly sci-fi name for a bunch of computers that are controlled by a central command-and-control structure. The number one challenge for botnet operators is hiding their command-and-control servers to avoid being taken down (the chances of actually being arrested are pretty close to nil). The Torpig botnet uses an increasingly popular technique where client machines try dialling into a set of pre-determined domain names and accept the first server to respond as the botmaster.
This is where the UCSB researchers moved in – they took over the Torpig botnet by sneakily claiming the domain name that was the next in line to be the command-and-control server. The botmasters behind Torpig had not claimed all the domain names that their victims were meant to dial into, either to save money or because they didn’t see this coming. In any case, the UCSB found itself in control of a botnet with hundreds of thousands of hosts.
Don’t try this at home. The researchers cooperated with law enforcement and other entities to avoid legal problems. This appears to have helped them steer clear of the hot water the BBC found itself in a few weeks ago for actually purchasing a botnet from criminals.
Botnets and the Hype Cycle
You’ve probably heard botnets talked about on the evening news. Botnets are a particularly successfully marketed part of the FUD-cycle of the information security industry.
But how bad is the botnet problem in reality? Not as bad as previously thought, according to the UCSB team. Previous studies have counted IP addresses rather than actual hosts when estimating the size of a botnet. Getting from IP addresses to actual machines is tough – DHCP leads to an overcounting, NAT to an undercounting, and there are many other factors at play. In the botnet the UCSB team analyzed, they counted 182900 hosts versus 1,247, 642 IP addresses, and there is evidence that IP addresses generally overcount actual machines.
But in many security reports IP addresses and computers are treated synonymously – the latest MacAfee report actually contains the sentence “In this quarter we detected nearly twelve million new IP addresses, computers under the control of spammers and others”. Arrghhhh…
Coverage of the UCSB work in the MSM did not mention the overcounting. “Botnets smaller problem than originally thought” doesn’t make much of a headline…
So I’m part of a botnet, so what?
Good question. Theoretically, a botmaster could read your email and abuse your other accounts to their heart’s desire. In fact, the UCSB researchers performed a keyword analysis of their victims’ emails (not sure how they got the legal clearance to do that…). But they are probably the only ones who bothered reading those emails. Botmasters want control of computers to make money and not to read about your date last Saturday. When someone breaks into your house they steal your valuables, not your diary.
Most online accounts and credit cards do not hold their users liable for fraudulent charges. In this way botnets operate a lot like insurance fraud or old-school credit card fraud. They are an annoyance that creates an indirect cost for everyone, but a cost that is sufficiently low that people are willing to bear it. We live in a society where people want to be able to use a 16 digit number they have given out hundreds of times to pay for stuff. If that means that everything costs 1% more to deal with fraud, so be it.
Brian Krebs (who should be on your reading list if he isn’t already)
posted a piece today about the dangers of allowing your PC to be compromised. Reading through his list of spam, click-through fraud, DoS attacks, and the like, I couldn’t get past the feeling of
dangerous for society – yes, dangerous for the user – not really. As far as some of the more nefarious password stealing stuff, there is little to no evidence so far that botnets are actually using user credentials for anything other than non-personal misuse of a person’s credentials. This isn’t great for society, but isn’t something the average user is going to care about.
Seems like just the kind of situation that calls for Uncle Sam (or Uncle Barroso)…
Laying Down the Law
The UCSB authors fault registrars for not sufficiently responsive to requests for taking down botnets. While ISP responsibility for content and traffic is a tricky political issue, the content industry has been very successful in forcing ISP accountability for peer-to-peer traffic on their networks. Of course the content industry has a bunch of well paid folks in Washington, Brussels, and other corridors of power pushing their agenda. Botnets do not directly affecting an entire industry’s bottom line and so there is no lobbying effort to move responsibility from the client to the registrars and ISPs.
Regulatory measures will not completely address the botnet issue, but would potentially significantly change the risk/time-invested/reward ratio. Botnets take a high degree of technical expertise to set-up and are of only limited value. A tighter regulatory regime could significantly reduce the incentive for botmasters.
User Education
You often hear about user education in botnet/information security stories, which all too often is vendor-ese for user indoctrination to buy security products. But the UCSB researchers – who have done a great piece of research and aren’t selling anything – also focus on user education as a solution to the botnet issue. Their statement that the “malware problem is fundamentally a cultural problem” places the onus for preventing complex and sophisticated criminal activity on the people least capable of preventing it.
It would be nice if all users were capable of being system administrators. For enterprise users, it is fair to expect a minimal level of technical skill. But the truth is that the technical measures a home user needs to take to secure his or her computer are simply beyond the grasp of significant portion of Internet users. The stuff you can educate home users about – choosing better passwords, not recycling passwords, etc is not going to make a real dent in the botnet problem.
*** This is a Security Bloggers Network syndicated blog from Boaz Gelbord authored by Unknown. Read the original post at: http://www.boazgelbord.com/2009/05/botnets-and-security-hype.html