Asprox botnet

The Asprox botnet (discovered around 2008), also known by its aliases Badsrc and Aseljo, is a botnet mostly involved in phishing scams and performing SQL injections into websites in order to spread malware.[1] While mostly considered inactive since 2015, more recently supposed infection has been used as a scare tactic in tech support scams.[2][3]

Operations

Since its discovery in 2008, the Asprox botnet has been involved in multiple high-profile attacks on various websites in order to spread malware. The botnet itself consists of roughly 15,000 infected computers as of May 2008,[4] although the size of the botnet itself is highly variable as the controllers of the botnet have been known to deliberately shrink (and later regrow) their botnet in order to prevent more aggressive countermeasures from the IT Community.[5]

The botnet propagates itself in a somewhat unusual way, as it actively searches and infects vulnerable websites running Active Server Pages. Once it finds a potential target the botnet performs a SQL Injections on the website, inserting an IFrame which redirects the user visiting the site to a site hosting Malware.[4][6]

The botnet usually attacks in waves – the goal of each wave is to infect as many websites as possible, thus achieving the highest possible spread rate. Once a wave is completed, the botnet lies dormant for an extended amount of time, likely to prevent aggressive counterreactions from the security community. The initial wave took place in July 2008, which infected an estimated 1,000 - 2,000 pages.[7][8] An additional wave took place in October 2009, infecting an unknown number of websites. Another wave took place in June 2010, increasing the estimated total number of infected websites from 2,000 to an estimated 10,000–13,000 within a day.[9][10][11]

Notable high-profile infections

While the infection targets of the Asprox botnet are randomly determined through Google searches, some high-profile websites have been infected in the past. Some of these infections have received individual coverage.

See also

References

  1. Leyden, John (2009-02-03). "ASProx botnet dials into Conficker domains". .theregister.co.uk. London, UK: The Register. Retrieved 2014-01-09.
  2. "Asprox botnet, a long-running nuisance, disappears".
  3. "Re: Elaborate Scam".
  4. Goodin, Dan (2008-05-14). "Botnet sics zombie soldiers on gimpy websites; More SQL injection insanity". .theregister.co.uk. London, UK: The Register. Retrieved 2014-01-09.
  5. Hines, Matthew (2009-10-06). "Botnets - Asprox Botnet Attacks Come Back - eWeek Security Watch". Securitywatch.eweek.com. Retrieved 2010-07-30.
  6. Michael Zino (2008-05-01). "ASCII Encoded/Binary String Automated SQL Injection Attack". bloombit.com. Archived from the original on 2008-06-01. Retrieved 2011-03-21.
  7. Sue Marquette Poremba (2008-05-15). "Asprox botnet malware morphs". SC Magazine US. Archived from the original on 1 July 2010. Retrieved 2010-07-30.
  8. "Asprox Botnet Mass Attack Hits Governmental, Healthcare, and Top Business Websites". CyberInsecure.com. 2008-07-18. Retrieved 2010-07-30.
  9. David Neal. "Asprox botnet causing serious concern - V3.co.uk - formerly vnunet.com". V3.co.uk. Archived from the original on 1 July 2010. Retrieved 2010-07-30.
  10. "Researchers: Asprox Botnet Is Resurging - botnets/Attacks". DarkReading. Archived from the original on 19 July 2010. Retrieved 2010-07-30.
  11. "Papers | SpiderLabs | About Us | Trustwave" (PDF). M86security.com. 2008-10-29. Archived from the original (PDF) on 2012-04-10. Retrieved 2014-01-09.
  12. "Sony PlayStation's site SQL injected, redirecting to rogue security software". ZDNet. 2008-07-02. Archived from the original on 12 August 2010. Retrieved 2010-07-30.
  13. "Adobe's Serious Magic site SQL Injected by Asprox botnet". ZDNet. Archived from the original on 5 August 2010. Retrieved 2010-07-30.


This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.