|
||
Botnets: Who Really ''Owns'' Your Computers? Sometimes it's satisfying to leave the confines of the NOC and take a stroll through the cube farm, secure in the knowledge that the machines on your network are secure and in hand.
Except, perhaps, when they're not.
A ''botnet'' is a collection of computers that have been infected with remote-control software. An IRC ''bot'' is the software that gets installed by a virus, which in turn connects to an IRC (Internet Relay Chat) server -- the control plane for sending commands to the bots.
A typical botnet scenario involves thousands of compromised Windows machines and a single ''attack'' command issued by the owner of the botnet, resulting in once innocent computers executing an attack on an unsuspecting Web site. This article will explore common methods of infection and the capabilities the bots have, for the sake of better understanding these perils.
When an unpatched Windows computer connects to the Internet, survival is an unlikely prospect. Within minutes, the computer can become infected with a trojan or virus that installs an IRC bot. The bot will immediately ''phone home'' by connecting to an IRC server then stand by, awaiting commands. SANS has cited 24 minutes as the average amount of time a freshly installed Windows XP computer can last on the internet before infection. If you're running a fresh install of MS-SQL server, the time is considerably shorter. Some have cited sub-minute survival times for new, unpatched SQL servers.
What Can They Do?
Botnets have various capabilities, including denial of service attacks, spam relays, theft of personal information, and they even start web servers on infected computers to aid in phishing attacks. These are all illegal activities, and definitely not something you want coming from your computer. There's nothing worse than receiving e-mail from a different company's security officer with evidence you've been attacking them or sending spam.
This article was first published on EnterpriseNetworkingPlanet.com. To read the full article, click here.
|
||
|