Difference between revisions of "The rise of TOR-based botnets"

From Botnets.fr
Jump to navigation Jump to search
m (1 revision imported)
m (Text replacement - "/ www." to "/ |Site=www.")
Line 1: Line 1:
{{Publication
{{Publication
|Type=Blogpost
|Type=Blogpost
|Link=http://www.welivesecurity.com/2013/07/24/the-rise-of-tor-based-botnets/ www.welivesecurity.com
|Link=http://www.welivesecurity.com/2013/07/24/the-rise-of-tor-based-botnets/
|Site=www.welivesecurity.com
|Author=Aleksandr Matrosov
|Author=Aleksandr Matrosov
|NomRevue=We Live Security
|NomRevue=We Live Security

Revision as of 13:07, 31 July 2015

(Publication) Google search: [1]

The rise of TOR-based botnets
Botnet Atrax, PTA
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol TOR
Date 2013 / 2013-07-24
Editor/Conference ESET
Link http://www.welivesecurity.com/2013/07/24/the-rise-of-tor-based-botnets/ (Archive copy)
Author Aleksandr Matrosov
Type Blogpost

Abstract

We have been tracking the rise of TOR-based botnets this summer. In July two different malware families were detected that use the TOR hidden service protocol for stealth communication with C&C’s. The TOR hidden service protocol is well-suited to organizing stealth communication channel with a C&C but is slow for stealing high volumes of data from an infected machine. For cybercriminals the most useful way to use the hidden service protocol is for communicating with C&C, getting update for configuration information, or downloading additional malicious modules.

In July ESET researchers detected two different types of TOR-based botnets based on the malware families Win32/Atrax and Win32/Agent.PTA. Both botnets have form-grabbing functionality for possible further fraud operations. The Atrax botnet looks more complex and interesting, so we begin this blog by analysing it.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1355,
   editor = {ESET},
   author = {Aleksandr Matrosov},
   title = {The rise of TOR-based botnets},
   date = {24},
   month = Jul,
   year = {2013},
   howpublished = {\url{http://www.welivesecurity.com/2013/07/24/the-rise-of-tor-based-botnets/}},
 }