Mega-D botnet

Mega-D botnet

The Mega-D, also known by its alias of Ozdok, is a botnet that at its peak was responsible for sending between 30% and 35% of spam worldwide.[1][2][3]

On October 14, 2008, the U.S Federal Trade Commission, in cooperation with Marshal Software, tracked down the owners of the botnet and froze their assets.[4]

On November 6, 2009, security company FireEye, Inc. disabled the Mega-D botnet by disabling its command and control structure.[5][6] This was akin to the Srizbi botnet takedown in late 2008. The Mega-D/Ozdok takedown involved coordination of dozens of Internet service providers, domain name registrars, and non-profit organizations like Shadowserver. M86 Security researchers estimated the take down had an immediate effect on the spam from the botnet. On November 9, 2009, the spam had stopped altogether, although there was a very small trickle over the weekend, directed to a couple of small UK-based domains that they monitored.[7]

Since then the botnet bounced back, exceeding pre-takedown levels by Nov. 22, and constituting 17% of worldwide spam by Dec. 13 [8]

In July 2010, researchers from University of California, Berkeley published a model of Mega-D's protocol state-machine, revealing the internals of the proprietary protocol for the first time [9]. The protocol was obtained through automatic Reverse Engineering technique developed by the Berkeley researchers. Among other contributions, their research paper reveals a flaw in the Mega-D protocol allowing template milking, i.e., unauthorized spam template downloading. Such a flaw could be used to acquire spam templates and train spam filters before spam hits the network.

Arrest

In November 2010, Oleg Nikolaenko was arrested in Las Vegas, Nevada by the Federal Bureau of Investigation and charged with violations of the CAN-SPAM Act of 2003.[10] Nikolaenko is suspected of operating the Mega-D botnet to create a "zombie network" of as many as 500,000 infected computers.[11]

See also

References

  1. ^ "Storm worm dethroned by sex botnet". Networkworld.com. http://www.networkworld.com/news/2008/020408-storm-worm-dethroned-by-sex.html. Retrieved 2010-07-31. 
  2. ^ "New Mega-D botnet supersedes Storm". SPAMfighter. 2008-02-01. http://www.spamfighter.com/News-9799-New-Mega-D-botnet-supersedes-Storm.htm. Retrieved 2010-07-31. 
  3. ^ [1][dead link]
  4. ^ Authorities Shut Down Spam Ring
  5. ^ Smashing the Mega-d/Ozdok botnet in 24 hours
  6. ^ Cheng, Jacqui (November 11, 2009). "Researchers' well-aimed stone takes down Goliath botnet". Ars Technica. http://arstechnica.com/security/news/2009/11/researchers-well-aimed-stone-take-down-goliath-botnet.ars. Retrieved 2009-11-30. 
  7. ^ "Mega-D botnet takes a hit". M86 Security. November 9, 2009. http://www.m86security.com/labs/traceitem.asp?article=1161. Retrieved 2009-11-30. 
  8. ^ "Spam Statisti cs from the Security Labs team at M86 Security". M86 Security. http://www.m86security.com/labs/spam_statistics.asp. Retrieved 2010-06-07. 
  9. ^ C.Y. Cho, D. Babic, R. Shin, and D. Song. Inference and Analysis of Formal Models of Botnet Command and Control Protocols, 2010 ACM Conference on Computer and Communications Security.
  10. ^ Vielmetti, Bruce (December 3, 2010). "Milwaukee FBI agent trips up Russian 'king of spam'". Milwaukee Journal Sentinel. http://www.jsonline.com/news/crime/111169714.html. Retrieved December 3, 2010. 
  11. ^ Leyden, John (December 1, 2010). "Feds pursue Russian, 23, behind ⅓ of ALL WORLD SPAM". The Register. http://www.theregister.co.uk/2010/12/01/mega_d_botnet_suspect_named/. Retrieved December 3, 2010. 

Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Botnet — Un botnet est un ensemble de bots informatiques qui sont reliés entre eux. Historiquement, ce terme s est d abord confondu avec des robots IRC (bien que le terme ne se limitait pas à cet usage spécifique), qui était un type de botnet particulier… …   Wikipédia en Français

  • Botnet Srizbi — Le botnet Srizbi, aussi connu sous les noms de Cbepblay et Exchanger, est réputé être le plus grand ou le deuxième plus grand botnet et est responsable de la transmission de la moitié du spam qui transite par l ensemble des botnets… …   Wikipédia en Français

  • Botnet Storm — Demande de traduction Storm botnet → …   Wikipédia en Français

  • Botnet Mariposa — Mariposa, qui signifie papillon en espagnol, est un des plus imposant botnet mis au jour en début d année 2010. Selon les enquêteurs, 13 millions de machines zombies seraient infectées et donc contrôlées à des fins malveillantes[1]. Ce botnet se… …   Wikipédia en Français

  • Botnet — Ablauf der Entstehung und Verwendung von Botnetzen: 1. Infizierung ungeschützter Computer, 2. Eingliederung in das Botnet, 3. Botnetbetreiber verkauft Dienste des Botnets, 4./5. Ausnutzung des Botsnets, etwa für den Versand von Spam Ein Botnet… …   Deutsch Wikipedia

  • Srizbi botnet — Botnet Srizbi Le botnet Srizbi, aussi connu sous les noms de Cbepblay et Exchanger, est réputé être le plus grand ou le deuxième plus grand botnet et est responsable de la transmission de la moitié du pourriel qui transite par l ensemble des… …   Wikipédia en Français

  • Storm botnet — Botnet Storm Le Botnet Storm ou Storm worm botnet est un réseau commandé à distance de machines zombies (ou botnet ), qui ont été connectées par le Storm Worm, un cheval de Troie répandu par pourriel (communication électronique non sollicitée).… …   Wikipédia en Français

  • Storm botnet — The typical lifecycle of spam that originates from a botnet: (1) Spammer s web site (2) Spammer (3) Spamware (4) Infected computers (5) Virus or trojan (6) Mail servers (7) Users (8) Web traffic The Storm… …   Wikipedia

  • BredoLab botnet — The BredoLab Botnet, also known by its alias Oficla,[1] was a Russian founded[2] botnet mostly involved in viral e mail spam. Before the botnet was eventually dismantled in November 2010 through the seizure of 143 command and control servers, it… …   Wikipedia

  • Mariposa botnet — The Mariposa botnet, discovered December 2008,[1] is a botnet mainly involved in cyberscamming and denial of service attacks.[2][3] Before the botnet itself was dismantled on December 23, 2009, it consisted of 8 to 12 million individual… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”