flashopf.blogg.se

Be your own botmaster 2nd edition
Be your own botmaster 2nd edition










The answer is staggeringly simple: the crooks don’t call you and tell you what to do. So, how do botmasters connect to your computer to control the malware on it? In short, outsiders can’t easily connect into your network by default, even if you want them to.

Be your own botmaster 2nd edition

If you start up a web server like IIS or a mail server like Exchange on your home network, the chances are that neither of them will work straight away: you will need to make a series of deliberate changes in your firewall configuration. We still haven’t explained how a crook sitting on the other side of the world can choose which of these “features” to run, and when.Īfter all, you probably have a router and a firewall that block all inbound network connections by default. So, once a zombie is running on your computer – whether you were reckless, incautious or merely unfortunate to get infected – it, too, can do any of these things on your behalf, even though you never meant to invite it to do so. Of course, you don’t actually do these things: you invite software to do them on your behalf. You can (and probably often do) send email browse websites use social networks download programs search your files and more. The reason why a zombie can do all of these things without you realising is, quite simply, that you could do any or all of them yourself if you wanted. The controlling crook, known as a bot-herder or botmaster, can add and remove other malware programs at will. → The last function, downloading more malware, is the reason why it is difficult to give an exhaustive list of what might have happened to your computer while it was infected. Downloading more malware at the whim of the crook who is in control.Updating the running malware to add new features and stay ahead of your defences.Sending out spam, often in vast quantities.Attacking other people’s websites, making you look like the crook.Mapping out your network from the inside to assist with future attacks.Acting as a proxy, or relay, and charging rent to other crooks so they can use your internet connection to cover their tracks.Posting “recommendations” for your friends on your social networks.Tricking you into clicking on ads to generate pay-per-click revenue.Searching through your files for interesting data to steal.Logging your keystrokes to steal online usernames and passwords.

Be your own botmaster 2nd edition

Some malware is pre-programmed for one specific criminal act, such as ransomware that scrambles your data and demands a fee to get it back.īut most bots or zombies are kitted out with a wide range of “features.”Īny of these can be controlled across the internet by a crook.Ĭommon crimeware functions built into bots include: We regularly write about “bots”, or “zombies,” malicious programs that let cybercriminals take over your computer from afar.












Be your own botmaster 2nd edition