Asprox botnet

From Wikipedia, the free encyclopedia

The Asprox botnet (discovered around 2008), also known by its aliases Badsrc and Aseljo, is a botnet mostly involved in phishing scams and performing SQL injections into websites in order to spread malware.[1] It is a highly infectious malware which spreads through an email or through a clone website. It can be used to trace any kind of personal or financial information and activities online.[2][3]


Since its discovery in 2008 the Asprox botnet has been involved in multiple high-profile attacks on various websites in order to spread malware. The botnet itself consists of roughly 15,000 infected computers as of May, 2008,[4] although the size of the botnet itself is highly variable as the controllers of the botnet have been known to deliberately shrink (and later regrow) their botnet in order to prevent more aggressive countermeasures from the IT Community.[5]

The botnet propagates itself in a somewhat unusual way, as it actively searches and infects vulnerable websites running Active Server Pages. Once it finds a potential target the botnet performs a SQL injection on the website, inserting an IFrame which redirects the user visiting the site to a site hosting Malware.[4][6]

The botnet usually attacks in waves - the goal of each wave is to infect as many websites as possible, thus achieving the highest possible spread rate. Once a wave is completed the botnet lay dormant for an extended amount of time, likely to prevent aggressive counterreactions from the security community. The initial wave took place in July, 2008, which infected an estimated 1,000 - 2,000 pages.[7][8] An additional wave took place in October 2009, infecting an unknown number of websites. Another wave took place in June 2010, increasing the estimated total number of infected domains from 2,000 to an estimated 10,000 - 13,000 within a day.[9][10][11]

Notable high-profile infections[edit]

While the infection targets of the Asprox botnet are randomly determined through Google searches, some high-profile websites have been infected in the past. Some of these infections have received individual coverage.

See also[edit]


  1. ^ Leyden, John (2009-02-03). "ASProx botnet dials into Conficker domains". London, UK: The Register. Retrieved 2014-01-09.
  2. ^ "Asprox botnet, a long-running nuisance, disappears".
  3. ^ "Re: Elaborate Scam".
  4. ^ a b Goodin, Dan (2008-05-14). "Botnet sics zombie soldiers on gimpy websites; More SQL injection insanity". London, UK: The Register. Retrieved 2014-01-09.
  5. ^ Hines, Matthew (2009-10-06). "Botnets - Asprox Botnet Attacks Come Back - eWeek Security Watch". Retrieved 2010-07-30.
  6. ^ Michael Zino (2008-05-01). "ASCII Encoded/Binary String Automated SQL Injection Attack". Archived from the original on 2008-06-01. Retrieved 2011-03-21.
  7. ^ Sue Marquette Poremba (2008-05-15). "Asprox botnet malware morphs". SC Magazine US. Archived from the original on 1 July 2010. Retrieved 2010-07-30.
  8. ^ a b "Asprox Botnet Mass Attack Hits Governmental, Healthcare, and Top Business Websites". 2008-07-18. Retrieved 2010-07-30.
  9. ^ David Neal. "Asprox botnet causing serious concern - - formerly". Archived from the original on 1 July 2010. Retrieved 2010-07-30.
  10. ^ "Researchers: Asprox Botnet Is Resurging - botnets/Attacks". DarkReading. 15 July 2010. Archived from the original on 19 July 2010. Retrieved 2010-07-30.
  11. ^ "Papers | SpiderLabs | About Us | Trustwave" (PDF). 2008-10-29. Archived from the original (PDF) on 2012-04-10. Retrieved 2014-01-09.
  12. ^ "Sony PlayStation's site SQL injected, redirecting to rogue security software". ZDNet. 2008-07-02. Archived from the original on 12 August 2010. Retrieved 2010-07-30.
  13. ^ "Adobe's Serious Magic site SQL Injected by Asprox botnet". ZDNet. Archived from the original on 5 August 2010. Retrieved 2010-07-30.