Difference between revisions of "DDoS watch: keeping an eye on Aldi Bot"

From Botnets.fr
Jump to navigation Jump to search
 
m (1 revision imported)
 
(No difference)

Latest revision as of 16:22, 7 February 2015

(Publication) Google search: [1]

DDoS watch: keeping an eye on Aldi Bot
Botnet Aldi Bot
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2011 / 5 octobre 2011
Editor/Conference Arbor Networks
Link http://ddos.arbornetworks.com/2011/10/ddos-aldi-bot/ (Archive copy)
Author Curt Wilson
Type

Abstract

The intention of this entry is to profile some elements of the Aldi Bot in order to provide value for the security operations community and malware research community.

Aldi Bot is a newer inexpensive DDoS bot that is growing in popularity. Recent data (September 30 2011) suggests that there are at least 50 distinct Aldi bot binaries that have been seen in the wild with 44 unique Command & Control points. We see the bot active in Russia, the Ukraine, the US, and Germany. While it has been stated that Aldi Bot won’t be developed further, the source code has leaked which makes it easy to find and use.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2011BFR834,
   editor = {Arbor Networks},
   author = {Curt Wilson},
   title = {DDoS watch: keeping an eye on Aldi Bot},
   date = {Error: Invalid time.},
   month = Error: Invalid time.,
   year = {2011},
   howpublished = {\url{http://ddos.arbornetworks.com/2011/10/ddos-aldi-bot/}},
 }