iTnews
  • Home
  • News
  • Technology
  • Security

Chinese-built botnets full of bugs

By Darren Pauli on Oct 6, 2011 3:37PM
Chinese-built botnets full of bugs

Botnets borrow code, and bugs too.

Chinese botnets were poorly constructed and riddled with errors, according to security researchers.

Jeff Edwards and Jose Nazario, researchers at denial of service (DoS) prevention firm Arbor Networks, said Trojan malware used in the botnets contained flaws and were not concealed.

They told the Virus Bulletin 2011 conference in Barcelona that blatant flaws in the used DoS attack botnets were duplicated by rival botnets that stole the source code.

Sophisticated modern botnets often used rootkits to conceal presence, were encrypted and could be difficult to trace and eradicate. The botnets also used varied DoS tactics such as low rate denial of service attacks (pdf).

But Edwards and Nazario said Chinese botnets lacked the technology and conducted only simple DoS attacks such as SYN, TCP and HTTP floods.

They found about 40 Chinese-based botnet families of which about 20 were distinct malware families, including Darkshell, IMDDOS, Rincux, NetBot Attacker and YoyoDDoS families the researchers said.

The botnets targeted specific victims. The Darkshell botnet attacked the industrial food processing industry, IMDDOS attacked gambling websites, Rincux attacked the mining sector, and versions of Netbot Attacker had in 2008 targeted US news site CNN.

“We were surprised when we discovered that its operators have such a propensity for attacking one particular commercial market segment,” he said in a blog post.

All of the studied botnets were thought to be built in China or were controlled primarily from Chinese IP addresses.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:
arbor networksbotnetsddossecurityvirus bulletin

Partner Content

Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
"We're seeing some good policy put in place, but that's the exception"
Partner Content "We're seeing some good policy put in place, but that's the exception"

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Darren Pauli
Oct 6 2011
3:37PM
0 Comments

Related Articles

  • Geolocation threats rise following demonstration of router hacking that can pinpoint a person's home
  • VMware, F5, Log4j added to EnemyBot attack targets
  • Victorian man sentenced for DoS-ing police phone lines
  • Collins Foods puts IT focus on security controls, cloud services
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

NBN Co taking orders for 'non-premises' connections

NBN Co taking orders for 'non-premises' connections

NSW Police scores $100m to connect body-cams to firearms, tasers

NSW Police scores $100m to connect body-cams to firearms, tasers

Digital Nation

Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
The security threat of quantum computing
The security threat of quantum computing
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.