Professional mining botnet
It's a scam. Many Internet enterprises and network security enterprises believe that illegal "mining" has become a serious network security problem
with the rise of "cloud mining", the virtual machine has become the main use object of digital currency such as Monroe coin and Eli coin, and the situation of embezzling cloud computing resources for "mining" has also increased significantly; Security team monitoring found that "competing for mining machine" has become one of the important purposes of Botnet expansion; And found a new type of "mining" virus (mining XmR / Monroe), the virus spread wildly in two months, illegal "mining" profits of nearly one million yuan
extended information:
from a commercial point of view, the business model of mining can walk out of a "healthy road". As long as the "incentive money" is lower than the average cost of new users in the market, the business model will be reasonable and feasible
however, if the platform tempts users to participate with "no capital, no profit", it is worth being vigilant. The so-called "mining" opportunity provided by the platform is likely to be "digging a good hole" waiting for you to jump in
of course, bitcoin is not perfect. Even if it is bad, at least it will be better than legal currency in one point, that is, there will be no inflation.
If a computer is attacked by DOS from a botnet, there is little choice. Generally speaking, botnets are geographically distributed, so it is difficult to determine the attack mode of botnets
passive operating system fingerprint identification can confirm the attack from botnet. Network administrators can configure firewall devices and use the information obtained from passive operating system fingerprint identification to take action against botnet. The best defense measure is to use the intrusion prevention system with special hardware
some botnets use free DNS hosting services to point a subdomain to an IRC server harboring "broilers". Although these free DNS services do not attack themselves, they provide a reference point. Clearing these services can disrupt the entire botnet. Recently, some companies have tried to eliminate the subdomains of these domains. Zombie communities call this route "null route" because DNS hosting services usually redirect aggressive subdomains to an inaccessible IP address
the botnet server structure mentioned above has inherent loopholes and problems. For example, if a server with botnet channel is found, all other servers and other zombies will be exposed. If a botnet server lacks rendancy, disconnecting the server will cause the whole botnet to crash. However, IRC server software includes some features to hide other servers and zombies, so finding a channel may not lead to the demise of botnets
host based technology uses heuristics to identify zombie behaviors that bypass traditional anti-virus mechanisms. The network-based methods graally use the above technologies to shut down the servers that botnets rely on, such as the DNS project of "empty route", or shut down the IRC server completely
however, the new generation of Botnet is almost entirely P2P. By embedding command and control into Botnet, botnet can avoid the failure of a single point through dynamic update and change. Spyware can hard code all suspicious passwords into the botnet with a public key. The data captured by botnet can only be read through the private key held by the botnet controller
it must be pointed out that the new generation botnet can detect and respond to attempts that can analyze the way it works. For example, when a large botnet detects that it is being analyzed, it can even disconnect researchers from the network. So units need professional botnet solutions
botnet solutions
the good news is that defense forces are also responding quickly when threats continue to grow. If you are in charge of a large enterprise, you can use some commercial procts or open source procts to deal with these threats
first of all, fireeye's proct, which can give a clear view of any attack without any signature assistance. Fireeye's virtual machine is private, which reces the risk of attackers learning how to destroy the virtual machine. Fireeye can identify botnet nodes and block their communication with client networks. This allows the customer's IT staff to take action when fireeye detects a botnet attack and then easily rebuild the infected system. When network access is less critical, infected machines can be banned immediately. Damballa created its own technology to track and defend botnets. The company's failsafe solution can identify damaged hosts within the enterprise network without using signature or behavior-based techniques. In addition, secureworks and eye digital security also have their own special technology to deal with botnets
famous large companies, such as Google, are unlikely to be defeated by botnets. The reason is very simple, they mainly rely on distributed servers. DDoS attackers will have to conquer this global distributed network, which is almost impossible, because this network can process up to 650GB of data per second. Small companies can guard against DDoS attacks by carefully selecting their Internet providers. It is a good idea if the providers can confirm and filter attacks at the high-speed link access level
however, because DDoS attacks are so easy to detect and intense, it is easy for defenders to isolate and clear botnets. Criminal organizations typically retain their resources for tasks that bring them more money and minimize their exposure.