{"id":830,"date":"2008-04-08T04:37:32","date_gmt":"2008-04-08T04:37:32","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2008\/04\/kraken-botnet-twice-the-size-of-storm\/"},"modified":"2015-09-09T19:39:31","modified_gmt":"2015-09-09T11:39:31","slug":"kraken-botnet-twice-the-size-of-storm","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2008\/04\/kraken-botnet-twice-the-size-of-storm\/","title":{"rendered":"Kraken Botnet Twice The Size Of Storm"},"content":{"rendered":"

[ad]<\/p>\n

We wrote a while back about a new wave of sophisticated botnets<\/a>, which were predicted to overtake Storm <\/a>and become the largest infectors online.<\/p>\n

It seems like it’s come true, after extensive research Damballa has uncovered the biggest botnet ever, which at present has over 400,000 unique IPs (in a space of only 24 hours) which is more than double that of storm. <\/p>\n

Imagine the kind of traffic that could produce in a concentrated DDoS attack?<\/p>\n

Researches have unearthed what they say is the biggest botnet ever. It comprises over 400,000 infected machines, more than twice the size of Storm, which was previously believed to be the largest zombie network.<\/p>\n

Machines from at least 50 Fortune 500 companies have been observed to be running the malicious software that’s at the heart of “Kraken,” the botnet that security firm Damballa has been tracking for the last few weeks. So far, only about 20 percent of the anti-virus products out there are detecting the malware. Just as a con artist might throw off detectives by changing his hair color or other physical characteristics, Kraken’s ability to morph its code base has allowed it to evade the majority of malware detectors.<\/p>\n

“Kraken, despite being on all these people’s computers, has such low anti-virus coverage,” said Paul Royal, principal researcher at Atlanta-based Damballa. “Anti-virus companies can’t keep up with the arms race because of the number of variants and the frequency of the updates.”<\/p><\/blockquote>\n

It’s a sad fact that only 20% of AV products actually detect the malware part of the infection. Kraken morphs its’ codebase which certainly makes it more difficult to recognise. It’s also frequently updated and seem to evade even the more advanced security protection that companies use like firewalls with AV capability, IDS and IPS.<\/p>\n

Kraken’s primary activity is sending spam that advertises high-interest loans, male-enhancement techniques, fake designer watches and gambling opportunities. Damballa has observed as many as 500,000 pieces of junk mail being sent from a single zombie.<\/p>\n

Estimates have varied wildly for the number of bots belonging to the Storm network. While some researchers have said millions of machines have been compromised, MessageLabs in February put the number of nodes at just 85,000. Whatever the number – Damballa estimates Storm has 200,000 victim – it was believed to be the biggest.<\/p>\n

Until now, that is. It has clearly been eclipsed by Kraken, which on March 25 was observed to have compromised 409,912 unique IP addresses during a 24-hour period. Royal predicted the number will grow to more than 600,000 in the next two weeks.<\/p><\/blockquote>\n

It’s sending out a scary amount of spam…with 500,000 being sent from a single IP and there being 400,000 unique IPs in the network, that’s a hell of a lot of junk mail that can be sent out in one day.<\/p>\n

It seems like the guys doing this have a lot to gain financially so they are getting more and more advanced, more for us to fight against eh?<\/p>\n

<\/p>\n

Source: The Register<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

[ad] We wrote a while back about a new wave of sophisticated botnets, which were predicted to overtake Storm and become the largest infectors online. It seems like it’s come true, after extensive research Damballa has uncovered the biggest botnet ever, which at present has over 400,000 unique IPs (in a space of only 24 […]<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[7,25],"tags":[2502,142,114,2385,2593,115,497],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Darknet","author_link":"https:\/\/www.darknet.org.uk\/author\/darknet\/"},"_links":{"self":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts\/830"}],"collection":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/comments?post=830"}],"version-history":[{"count":0,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts\/830\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/media?parent=830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/categories?post=830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/tags?post=830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}