Cyber-crooks Constantly Improvise DDoS Botnet of IRC/HTTP Type
According to researcher of cyber-crime Dancho Danchev who's also security blogger, with Webroot the security company, one Internet Relay Chat/ Hypertext Transfer Protocol, in short, IRC/HTTP oriented botnet spewing Distributed Denial of Service (DDoS) attacks which was recently presented on cyber-criminal forums for sale starting late 2012, remains under the control of cyber-criminals who continuously improvise and develop it, published Help Net Security in news on May 3, 2013.
Seemingly, the cyber-crooks' current action is because of what's well-known about DDoS assaults that are no longer merely hacktivists' protest tool, but are currently certain means for the cyber-criminals towards hampering Bitcoin exchanges, attacking gambling websites, anti-spam agencies, etc.
Remarking about his fascinating development, Dancho Danchev wrote that the botnet had changed from its earlier form, which was IRC-based, to an HTTP-based version, backing ten separate Distributed Denial-of-Service assault methods while also owning a utility that let it to deliberately as well as heuristically eliminate rival malware like SpyEye, ZeuS or Citadel on the target infected computers.
The security blogger asserts the botnet perfectly helps contaminate Windows PCs, while exudes a few of the highly sophisticated and best DDoS techniques, obtainable via trade, which can disrupt gaming servers, web-servers, VoIP/teamspeak servers, household bandwidth and so on, quite easily.
Moreover, with regards to the cost, Danchev outlines that whereas one needs to pay $100 to obtain the IRC-based bot, he needs to pay $300 to obtain the HTTP-based form.
And because of its cost-price, there has been a lot of commentary generated from peer cyber-crooks on various community sites supporting cyber-crime, leading to one cracked version obtainable solely to the said community sites' members.
Danchev blogged that the current bot was yet one more case of certain licensing model
that was technically erroneous, vis-à-vis its malware, letting peer cyber-crooks towards making insignificant, the whole work prototype of the vendor. Actions by rival suppliers of crime-ware or malware samples under the target of the botnet would wholly rely on how much those samples captured the market, yet again because of their affordable costs, he explained. Blog.webroot.com published this in news on May 3, 2013.
» SPAMfighter News - 5/10/2013