Asprox botnet explained

The Asprox botnet (discovered around 2008), also known by its aliases Badsrc and Aseljo, is a botnet mostly involved in phishing scams and performing SQL injections into websites to spread malware.[1] It is a highly infectious malware which spreads through an email or through a clone website. It can be used to trace any kind of personal or financial information and activities online.[2] [3]

Operations

Since its discovery in 2008 the Asprox botnet has been involved in multiple high-profile attacks on various websites in order to spread malware. The botnet itself consists of roughly 15,000 infected computers as of May, 2008,[4] although the size of the botnet itself is highly variable as the controllers of the botnet have been known to deliberately shrink (and later regrow) their botnet to prevent more aggressive countermeasures from the IT Community.[5]

The botnet propagates itself in a somewhat unusual way, as it actively searches and infects vulnerable websites running Active Server Pages. Once it finds a potential target the botnet performs a SQL injection on the website, inserting an IFrame which redirects the user visiting the site to a site hosting Malware.[4] [6]

The botnet usually attacks in waves – the goal of each wave is to infect as many websites as possible, thus achieving the highest possible spread rate. Once a wave is completed the botnet lay dormant for an extended amount of time, likely to prevent aggressive counterreactions from the security community. The initial wave took place in July, 2008, which infected an estimated 1,000 – 2,000 pages.[7] [8] An additional wave took place in October 2009, infecting an unknown number of websites. Another wave took place in June 2010, increasing the estimated total number of infected domains from 2,000 to an estimated 10,000 – 13,000 within a day.[9] [10] [11]

Notable high-profile infections

While the infection targets of the Asprox botnet are randomly determined through Google searches, some high-profile websites have been infected in the past. Some of these infections have received individual coverage.

See also

Notes and References

  1. Web site: ASProx botnet dials into Conficker domains . John . Leyden . .theregister.co.uk . . London, UK . 2009-02-03 . 2014-01-09.
  2. Web site: Asprox botnet, a long-running nuisance, disappears.
  3. Web site: Re: Elaborate Scam.
  4. Web site: Botnet sics zombie soldiers on gimpy websites; More SQL injection insanity . Dan . Goodin . .theregister.co.uk . . London, UK . 2008-05-14 . 2014-01-09.
  5. Web site: Hines . Matthew . Botnets – Asprox Botnet Attacks Come Back – eWeek Security Watch . Securitywatch.eweek.com . 2009-10-06 . 2010-07-30.
  6. Web site: Michael Zino. ASCII Encoded/Binary String Automated SQL Injection Attack. bloombit.com. 2008-05-01. 2011-03-21. https://web.archive.org/web/20080601094431/http://www.bloombit.com/Articles/2008/05/ASCII-Encoded-Binary-String-Automated-SQL-Injection.aspx. 2008-06-01. dead.
  7. Web site: Sue Marquette Poremba . Asprox botnet malware morphs . SC Magazine US . 2008-05-15 . 2010-07-30 . https://web.archive.org/web/20100701031546/http://www.scmagazineus.com/asprox-botnet-malware-morphs/article/110169/ . 1 July 2010 . dead .
  8. Web site: Asprox Botnet Mass Attack Hits Governmental, Healthcare, and Top Business Websites . CyberInsecure.com . 2008-07-18 . 2010-07-30.
  9. Web site: David Neal . Asprox botnet causing serious concern - V3.co.uk - formerly vnunet.com . V3.co.uk . 2010-07-30. https://web.archive.org/web/20100701025253/http://www.v3.co.uk/v3/news/2265398/asprox-spambot-digging. 1 July 2010 . live.
  10. Web site: Researchers: Asprox Botnet Is Resurging – botnets/Attacks . 15 July 2010 . DarkReading . 2010-07-30. https://web.archive.org/web/20100719101326/http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=225800197. 19 July 2010 . live.
  11. Web site: Papers | SpiderLabs | About Us | Trustwave . M86security.com . 2008-10-29 . 2014-01-09 . dead . https://web.archive.org/web/20120410141306/http://www.m86security.com/documents/pdfs/security_labs/m86_security_labs_report_1H2010.pdf . 2012-04-10 .
  12. Web site: Sony PlayStation's site SQL injected, redirecting to rogue security software . ZDNet . 2008-07-02 . 2010-07-30. https://web.archive.org/web/20100812025957/http://www.zdnet.com/blog/security/sony-playstations-site-sql-injected-redirecting-to-rogue-security-software/1394. 12 August 2010 . dead.
  13. Web site: Adobe's Serious Magic site SQL Injected by Asprox botnet . ZDNet . 2010-07-30. https://web.archive.org/web/20100805070832/http://www.zdnet.com/blog/security/adobes-serious-magic-site-sql-injected-by-asprox-botnet/2039. 5 August 2010 . dead.