Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management

    McAfee Examines Botnet Use of Social Networks, Web 2.0

    Written by

    Brian Prince
    Published September 30, 2010
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Botnet operators are always on the lookout for ways to get around the security community-a fact that has led some to turn to Web 2.0 to gain an edge.

      In a new report (PDF), researchers at McAfee examine the evolution of botnets as well as examples of people using sites like Twitter and LinkedIn as command and control (C&C) mechanisms.

      “I would expect social networks like Twitter to be used only as a command and control last resort to allow a botmaster to re-home his botnet to a new and more secure botnet C&C structure, after he has lost control of it for some reason,” said Adam Wosotowsky, principal engineer at McAfee Labs. “Botmasters will continue to use whatever form of communication they can, so I’d expect for this to continue.”

      In 2009, Arbor Networks uncovered a botnet using Twitter as a command and control mechanism. Since then, other evidence of attackers moving toward Web 2.0 sites have emerged. Researchers at Sunbelt Software, for example, found a Trojan botnet creator tool called TwitterNet Builder in May. The tool has a basic interface, prompting users to enter a Twitter username for a Trojan to follow. When they hit the “Build” button, an executable will follow the named account and wait for commands.

      In addition to highlighting TwitterNet Builder, McAfee researchers noted yet another example of this trend in the form of KeriosC2, a proof-of-concept tool for controlling a botnet through Twitter, LinkedIn and TinyURL.

      “There is not much that Twitter or Facebook can do to successfully prevent it because simple things like encryption can be used on the commands, turning them into strings of random characters for all intents and purposes,” Wosotowsky said. “In many cases it might not be the user who owns the site or Facebook page that is responsible for the post. If I know that some LiveJournal page is going to exist, all I need to do is go post a comment on the most recent post.”

      As the trend of botnets “riding on top of commonly used applications and protocols” continues, botnet communications will be more challenging to detect and prevent, McAfee researchers stated in the paper. Looking ahead, the company predicts there will be more multibrowser functionality beyond Internet Explorer and Mozilla Firefox, as well as more built-in integration with instant messaging technologies such as JabberZeuS to provide faster access to banking and other data.

      “While botnets like Twitbot are not widespread, they demonstrate how easy it is to do it, and that any social network is vulnerable to [this] kind of attack,” said Pedro Bueno, malware research scientist at McAfee Labs, adding, “All major social networks must be prepared to act fast when receiving takedown requests and improve their monitoring methods.”

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.