Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Botnet Crime Social Networks The Internet News

Attackers Using Social Networks For Botnet Control 40

Trailrunner7 writes "Bot herders and the crimeware gangs behind banker Trojans have had a lot of success in the last few years with using bulletproof hosting providers as their main base of operations. But more and more, they're finding that social networks such as Twitter and Facebook are offering even more fertile and convenient grounds for controlling their malicious creations. New research from RSA shows that the gangs behind some of the targeted banker Trojans that are such a huge problem in some countries, especially Brazil and other South American nations, are moving quietly and quickly to using social networks as the command-and-control mechanisms for their malware. The company's anti-fraud researchers recently stumbled upon one such attack in progress and watched as it unfolded."
This discussion has been archived. No new comments can be posted.

Attackers Using Social Networks For Botnet Control

Comments Filter:
  • Obvious next step (Score:5, Insightful)

    by The MAZZTer ( 911996 ) <.moc.liamg. .ta. .tzzagem.> on Monday July 19, 2010 @05:32PM (#32956702) Homepage

    Steganography [wikipedia.org]. Of course it alone won't keep a good virus researcher from figuring out what's going on, but Facebook/whoever will just see a legitimate profile (and that may make it that much harder to get it taken down).

    Messages posted, postings on others' walls, images posted, even friends made in a particular order could all carry hidden meaning for watching malware.

  • The new IRC? (Score:2, Insightful)

    by bjartur ( 1705192 ) on Monday July 19, 2010 @05:43PM (#32956844)

    Meh, IRC has been used for this purpose for a long time. Switching to the centralised Twitter service for increased anonymity is just an evolution, not a revolution.

  • by Anonymous Coward on Monday July 19, 2010 @06:47PM (#32957702)

    The point is still valid regardless of how much you obfuscate the process of searching for commands. Lets say you have a botnet client that scans the images on 10,000 Facebook profiles looking for commands hidden by a steganographic process. A security researcher who has a copy of your botnet client is still able to either disassemble your client or monitor the execution/memory of your client and reverse engineer whatever methods you use to search for commands.

    It's similar to the way a piece of software checks if it has a valid serial; this process may be obfuscated but it's still possible for crackers to reverse engineer this and create a key generator.

    Note: I'm not the same AC as above.

Work without a vision is slavery, Vision without work is a pipe dream, But vision with work is the hope of the world.

Working...