Asprox botnet

From Wikipedia, the free encyclopedia
Jump to: navigation, search

The Asprox botnet (Discovered around 2008), also known by its aliases Badsrc and Aseljo, is a botnet mostly involved in phishing scams and performing SQL Injections into websites in order to spread Malware.[1][2][3]

Operations[edit]

Since its discovery in 2008 the Asprox botnet has been involved in multiple high-profile attacks on various websites in order to spread malware. The botnet itself consists of roughly 15,000 infected computers as of May, 2008,[4] although the size of the botnet itself is highly variable as the controllers of the botnet have been known to deliberately shrink (and later regrow) their botnet in order to prevent more aggressive countermeasures from the IT Community.[5]

The botnet propagates itself in a somewhat unusual way, as it actively searches and infects vulnerable websites running Active Server Pages. Once it finds a potential target the botnet performs a SQL Injections on the website, inserting an IFrame which redirects the user visiting the site to a site hosting Malware.[4][6]

The botnet usually attacks in waves - the goal of each wave is to infect as many websites as possible, thus achieving the highest possible spread rate. Once a wave is completed the botnet lay dormant for an extended amount of time, likely to prevent aggressive counterreactions from the security community. The initial wave took place in July, 2008, which infected an estimated 1,000 - 2,000 pages.[2][7] An additional wave took place in October 2009, infecting an unknown amount of websites. Another wave took place in June 2010, increasing the estimated total amount of infected domains from 2,000 to an estimated 10,000 - 13,000 within a day.[8][9][10]

Notable high-profile infections[edit]

While the infection targets of the Asprox botnet are randomly determined through Google searches, some high profile websites have been infected in the past. Some of these infections have received individual coverage.

See also[edit]

References[edit]

  1. ^ "Indian Computer Emergency Response Team". Cert-In. Archived from the original on 5 September 2010. Retrieved 2010-07-30. 
  2. ^ a b Sue Marquette Poremba (2008-05-15). "Asprox botnet malware morphs". SC Magazine US. Archived from the original on 1 July 2010. Retrieved 2010-07-30. 
  3. ^ Leyden, John (2009-02-03). "ASProx botnet dials into Conficker domains". .theregister.co.uk. London, UK: The Register. Retrieved 2014-01-09. 
  4. ^ a b Goodin, Dan (2008-05-14). "Botnet sics zombie soldiers on gimpy websites; More SQL injection insanity". .theregister.co.uk. London, UK: The Register. Retrieved 2014-01-09. 
  5. ^ Hines, Matthew (2009-10-06). "Botnets - Asprox Botnet Attacks Come Back - eWeek Security Watch". Securitywatch.eweek.com. Retrieved 2010-07-30. 
  6. ^ Michael Zino (2008-05-01). "ASCII Encoded/Binary String Automated SQL Injection Attack". bloombit.com. 
  7. ^ a b "Asprox Botnet Mass Attack Hits Governmental, Healthcare, and Top Business Websites". CyberInsecure.com. 2008-07-18. Retrieved 2010-07-30. 
  8. ^ David Neal. "Asprox botnet causing serious concern - V3.co.uk - formerly vnunet.com". V3.co.uk. Archived from the original on 1 July 2010. Retrieved 2010-07-30. 
  9. ^ "Researchers: Asprox Botnet Is Resurging - botnets/Attacks". DarkReading. Archived from the original on 19 July 2010. Retrieved 2010-07-30. 
  10. ^ "Papers | SpiderLabs | About Us | Trustwave". M86security.com. 2008-10-29. Retrieved 2014-01-09. 
  11. ^ a b "Sony PlayStation's site SQL injected, redirecting to rogue security software". ZDNet. 2008-07-02. Archived from the original on 12 August 2010. Retrieved 2010-07-30.