On November 6, 2009, security company FireEye, Inc. disabled the Mega-D botnet by disabling its command and control structure. This was akin to the Srizbi botnet takedown in late 2008. The Mega-D/Ozdok takedown involved coordination of dozens of Internet service providers, domain name registrars, and non-profit organizations like Shadowserver. M86 Security researchers estimated the take down had an immediate effect on the spam from the botnet. On November 9, 2009, the spam had stopped altogether, although there was a very small trickle over the weekend, directed to a couple of small UK-based domains that they monitored.
Since then the botnet bounced back, exceeding pre-takedown levels by Nov. 22, and constituting 17% of worldwide spam by Dec. 13.
In July 2010, researchers from University of California, Berkeley published a model of Mega-D's protocol state-machine, revealing the internals of the proprietary protocol for the first time. The protocol was obtained through automatic Reverse Engineering technique developed by the Berkeley researchers. Among other contributions, their research paper reveals a flaw in the Mega-D protocol allowing template milking, i.e., unauthorized spam template downloading. Such a flaw could be used to acquire spam templates and train spam filters before spam hits the network.
In November 2010, Oleg Nikolaenko was arrested in Las Vegas, Nevada by the Federal Bureau of Investigation and charged with violations of the CAN-SPAM Act of 2003. Nikolaenko is suspected of operating the Mega-D botnet to create a "zombie network" of as many as 500,000 infected computers.
- Storm botnet
- MPack malware kit
- E-mail spam
- Internet crime
- Internet security
- Operation: Bot Roast
- "Storm worm dethroned by sex botnet". Networkworld.com. Retrieved 2010-07-31.
- "New Mega-D botnet supersedes Storm". SPAMfighter. 2008-02-01. Retrieved 2010-07-31.
- "New Mega-D menace muscles Storm Worm aside". ars technica. 2008-02. Retrieved 2011-12-06.
- Stone, Brad (October 14, 2008). "Authorities Shut Down Spam Ring". The New York Times.
- Smashing the Mega-d/Ozdok botnet in 24 hours
- Cheng, Jacqui (November 11, 2009). "Researchers' well-aimed stone takes down Goliath botnet". Ars Technica. Retrieved 2009-11-30.
- "Mega-D botnet takes a hit". M86 Security. November 9, 2009. Retrieved 2009-11-30.
- "Spam Statisti cs from the Security Labs team at M86 Security". M86 Security. Retrieved 2010-06-07.
- C.Y. Cho, D. Babic, R. Shin, and D. Song. Inference and Analysis of Formal Models of Botnet Command and Control Protocols, 2010 ACM Conference on Computer and Communications Security.
- Vielmetti, Bruce (December 3, 2010). "Milwaukee FBI agent trips up Russian 'king of spam'". Milwaukee Journal Sentinel. Retrieved December 3, 2010.
- Leyden, John (December 1, 2010). "Feds pursue Russian, 23, behind ⅓ of ALL WORLD SPAM". The Register. Retrieved December 3, 2010.
|This computing article is a stub. You can help Wikipedia by expanding it.|