{"id":14720,"date":"2013-10-11T00:00:34","date_gmt":"2013-10-11T06:00:34","guid":{"rendered":"https://www.webroot.com/blog/?p=14720"},"modified":"2023-12-01T14:20:22","modified_gmt":"2023-12-01T21:20:22","slug":"novice-cyberciminals-offer-commercial-access-5-mini-botnets","status":"publish","type":"post","link":"https://www.webroot.com/blog/2013\/10\/11\/novice-cyberciminals-offer-commercial-access-5-mini-botnets\/","title":{"rendered":"Novice cyberciminals offer commercial access to five mini botnets"},"content":{"rendered":"<p>With the increased public availability of <a href=\"https://www.webroot.com/blog/2013\/01\/18\/leaked-diy-malware-generating-tool-spotted-in-the-wild\/\"><strong>leaked<\/strong><\/a>\/<a href=\"https://www.webroot.com/blog/2013\/04\/17\/a-peek-inside-a-cracked-commercially-available-rat-remote-access-tool\/\"><strong>cracked<\/strong><\/a> DIY malware\/botnet generating tools, cybercriminals continue practically generating new botnets on the fly, in order to monetize the process by offering access to these very same botnets at a later stage in the botnet generation process. In addition to <a href=\"https://www.webroot.com/blog/2013\/07\/24\/newly-launched-http-based-botnet-setup-as-a-service-empowers-novice-cybercriminals-with-bulletproof-hosting-capabilities\/\"><strong>monetizing the actual process<\/strong><\/a> of <a href=\"https://www.webroot.com/blog/2013\/10\/01\/newly-launched-http-based-botnet-setup-service-empowers-novice-cybercriminals-bulletproof-hosting-capabilities-part-two\/\"><strong>setting up and hosting the botnet&#8217;s C&amp;C (command and control) servers<\/strong><\/a>, novice cybercriminals continue selling direct access to their newly generated botnets, empowering other novice cybercriminals with the foundations for further disseminating and later on monetizing other pieces of malicious software, part of their own arsenal of fraudulent\/malicious tools.<\/p>\n<p>Let&#8217;s discuss one such sample service run by novice cybercriminals, once again targeting cybercriminals, that&#8217;s selling direct access to <a href=\"http:\/\/www.zdnet.com\/blog\/security\/researchers-peek-inside-a-mini-zeus-botnet-find-60gb-of-stolen-data\/7018\"><strong>mini botnets<\/strong><\/a>\u00a0generated using what appears to be a cracked version of a popular DIY malware\/botnet generating kit, and emphasize on the service&#8217;s potential in the broader context of today&#8217;s highly professionalized cybercrime ecosystem.<\/p>\n<p><!--more--><\/p>\n<p><strong>Sample screenshots of the actual (international) underground market proposition:<\/strong><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy.png\"><img decoding=\"async\" loading=\"lazy\" width=\"279\" height=\"630\" class=\"size-full wp-image-14760 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy.png\" alt=\"Botnet_Sale_Purchase_Managed_Service_Eshop_Buy\" \/><\/a><\/p>\n<p><strong>Sample screenshots of the botnets he&#8217;s already sold access to:<\/strong><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_01.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1015\" height=\"588\" class=\"size-full wp-image-14762 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_01.png\" alt=\"Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_01\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_01.png 1015w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_01-300x173.png 300w\" sizes=\"(max-width: 1015px) 100vw, 1015px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_02.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1014\" height=\"544\" class=\"size-full wp-image-14763 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_02.png\" alt=\"Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_02\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_02.png 1014w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_02-300x160.png 300w\" sizes=\"(max-width: 1014px) 100vw, 1014px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_03.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1014\" height=\"669\" class=\"size-full wp-image-14764 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_03.png\" alt=\"Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_03\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_03.png 1014w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_03-300x197.png 300w\" sizes=\"(max-width: 1014px) 100vw, 1014px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_04.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1017\" height=\"668\" class=\"size-full wp-image-14765 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_04.png\" alt=\"Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_04\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_04.png 1017w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_04-300x197.png 300w\" sizes=\"(max-width: 1017px) 100vw, 1017px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_05.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1017\" height=\"549\" class=\"size-full wp-image-14766 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_05.png\" alt=\"Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_05\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_05.png 1017w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/10\/Botnet_Sale_Purchase_Managed_Service_Eshop_Buy_05-300x161.png 300w\" sizes=\"(max-width: 1017px) 100vw, 1017px\" \/><\/a><\/p>\n<p>Such (international) underground market services demonstrate the ease of generating and <a href=\"http:\/\/www.zdnet.com\/photos\/inside-the-botnets-that-never-make-the-news\/303596\"><strong>operating beneath the radar<\/strong><\/a> in 2013, where the size of the botnet is proportional with the (indirectly) applied OPSEC (Operational Security), thanks to the fact that such mini botnets are usually perceived as smaller threats compared to sophisticated botnets causing widespread damage on a daily basis. However, it&#8217;s these mini botnets that comprise a huge percentage of the botnets operated by adversaries launching targeted attacks online, and it&#8217;s only a matter of time before the botnet masters behind them realize the market potential of geolocated hosts in a specific region\/country of interest to their prospective customers.<\/p>\n<p>We expect that the novice cybercriminals behind these services will continue capitalizing on the market potential for serving other novice cybercriminals, with their services starting to apply basic QA (Quality Assurance) processes, next to the logical evolution into <a href=\"https://www.webroot.com/blog/2013\/08\/08\/one-stop-shop-for-spammers-offers-dkim-verified-smtp-servers-harvested-email-databases-and-training-to-potential-customers\/\"><strong>one-time-stop-E-shops<\/strong><\/a>, like the ones we&#8217;ve already discussed and profiled in our previous research highlighting some of the current and emerging cybercrime trends in 2013.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the increased public availability of leaked\/cracked DIY malware\/botnet generating tools, cybercriminals continue practically generating new botnets on the fly, in order to monetize the process by offering access to these very same botnets at a later stage in the botnet generation process. In addition to monetizing the actual process of setting up and hosting [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[3959,16377,5411,15095,16385,16379,16371,13333,14511,14499,16381,5799,16387,16375,6165,6157,14469,16383,16373,5977],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/14720"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=14720"}],"version-history":[{"count":8,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/14720\/revisions"}],"predecessor-version":[{"id":32417,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/14720\/revisions\/32417"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=14720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=14720"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=14720"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=14720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}