<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d24008684\x26blogName\x3d53cur!ty+6109\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dSILVER\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://g1rma.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://g1rma.blogspot.com/\x26vt\x3d7463756522070264080', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe", messageHandlersFilter: gapi.iframes.CROSS_ORIGIN_IFRAMES_FILTER, messageHandlers: { 'blogger-ping': function() {} } }); } }); </script>

53cur!ty 6109

Girma Nigusse

Hunt for Russia's web criminals | Technology | The Guardian

November 23, 2007

Hunt for Russia's web criminals | Technology | The Guardian: "Rise of the botnets

Botnet evolution is intrinsically linked to Internet Relay Chat (IRC). The first bots were developed from a messaging facility within IRC with a view to controlling PCs remotely.

Late 1999 SANS Institute researchers find remotely executable code on thousands of Windows machines. The infected computers are named "robots", shortened to "bot".

February 2000 Bot programs are encrypted, so their purpose only becomes clear when they are used to launch a distributed denial-of-service (DDoS) attack, bringing down sites such as Amazon and eBay.

October 22 2002 Nine of the internet's 13 "root DNS" servers are disabled in a massive attack by a bot herder advertising his services.

2002-04 Bots get more sophisticated and begin to handle tasks such as sending spam, hosting phishing sites, and other illegal activity.

2005 Code-changing techniques are developed to hide bots from security products. Professionals design, program, and support bot "packages" for criminals

2006 Peer-to-peer communication protocols pass command of the botnet between compromised PCs to evade bot hunters. Automated retaliatory attacks start on anything trying to find or interfere with a botnet.

February 6 2007 Second attack on internet's root DNS servers.

May 18 2007 Two-week attack on Estonia's computers takes the country offline following its government's moving of a statue of a Russian second world war soldier."

Source: guardian

leave a comment