Zombie and the backbone of Cyber Crime

Tags

To build botnet networks, a villain should be possible to spread malware to your computer. Computers into zombie terinfeksi alias slave criminals. When a network has more zombie botnet, the botnet that is becoming increasingly strong.

A malware is generally disseminated to smuggle malware into legal sites that have been exploited. There are also many other ways. For example with spam. In spam, diperdaya victims to click a particular link. When the link is clicked, the malware in the computer and menginfeksi victims.

At this time, criminals do not need to spread their own malware belonging to build botnet. Because many of the world black and Internet services offered spread of malware, either through legal or infection sites through spam. Service is called trafficking.

Trafficking services have the potential success rates vary depending on the infection. If a bandit master site that has many legal visitors, so that criminals can mematok trafficking service costs more expensive.

However, the cost of trafficking is the most expensive of all types of cyber crime services. Trafficking service providers generally rent sites that they control the cost of USD0, 50 to USD1 per thousand visitors.

But to hire services trafficking, botnet owners have to pay rent in advance, unless there is a guarantor state botnet owner will not mangkir of obligation to pay rent to the service provider trafficking.

Dark Hosting

In addition to smuggle malware sites that have been exploited legal, criminals also can spread malware by developing sites that evil was intended to Menebar infection. This measure is done because malware infection through legal temporary sites.

When site users to post complaints to the management of legal sites that they terinfeksi malware, then immediately make improvements to the site manager and malware sites that are removed so that it can not spread.

Such as legal sites, malicious sites hosting needs. Service provider hosting good certainly not ready to serve malicious site hosting services. Therefore, the spreading of malware many do on the server hosting the server-evil, which is dikelola criminals.

The service provider hosting the site will not be bad if there is a visitor site Perduli mengeluhkan malware infection from the site. Reason, the purpose of managing the money was from the evil, not to provide legal services hosting.

In addition to spreading malware, botnet owners also take advantage of hosting services to build the center Commando evil and handle botnet. In the world of black Internet, demand and supply hosting services evil together because of high development botnet held flaming.

Rental botnet

Trade services cyber crime took place is the flaming because LB has many customers. Economic crime in the Internet, customers most important role. They are willing to pay service cyber crime because huge benefit scam.

In the virtual world, botnet owners plow profits with rent botnet scam them. The tenant is generally botnet Carder (thieves kartu credit funds), extortionist, and spammer (spreader spam).

Carder many botnet renting because they can steal information from credit kartu zombie computers in the botnet that terjerat. Kartu credit information that can be used to direct victims to steal money or traded back.

Cyber crime in the world, Carder has a very important role because they are the most wealthy criminals. Reason, they can steal more money with the stolen credit information kartu. However, not all criminals dare to be due to withdrawal money Carder kartu credit information with a high risk of theft.

Besides Carder, is the tenant botnet extortionist. They rented botnet to perform DoS attacks (distributed denial of service) of the server-specific server. DoS attacks, a site can not be accessed because the server-nya kewalahan data processing waste.

If the site is terserang DoS desk online business, the owner of the site would suffer huge losses because customers can not access the service offered. DoS attacks are, reputation online business can be damaged because the treatment can not be presented in a stable.

Gap that has benefited the extortionist. They ask for blood money to the owner of the site so that DoS attacks stopped. If the ransom is not paid, then attack the site continues to be committed and even paralysis in the victim more often and longer.

The perpetrators also common DoS service rent for unfair competition. In these cases, perpetrators business online renting DoS attacks to disable server competitors. The hope was that customers from competitors could move to DoS attacks because the perpetrators competitors treatment does not work.

Customers from other LB botnet is renting the spammer. With a botnet, spammer can send spam through zombie computers in the network terjerat botnet rented. At this time, approximately 85% of spam circulating on the Internet delivered through the botnet.

Backbone of Evil

In the world of cyber crime, botnet is a most vital element. Reason, the need for encouraging the growth of botnet LB-LB supporting evil. When a botnet pejahat need, he encourages the growth of manufacturing LB malware, encryption and packaging, to spread malware, and malicious hosting sites.

Due to the presence of botnet is, siklus LB cyber crime continue to be rotating. With the money obtained from crime, the criminals also continue to develop their evil LB-LB. For example to create new malware, botnet to create a new network.

At this time, a botnet network may have hundreds to thousands of zombie computers. With a botnet, the criminals can steal more money from credit kartu victims, Menebar more spam, and launch a DoS attack stronger.

Because the backbone of botnet cyber crime, then the future evolution of the Internet depends strongly on the botnet. During the botnet is still there, cyber crime because criminals will still flaming will continue to get suplai funds to do evil.


EmoticonEmoticon