Last-minute paper: Lessons learned: sinkholing a peer-to-peer botnet

Ross Gibb Symantec
Vikram Thakur Symantec

  download slides (PDF)

Since 2012, one of the most prevalent botnets worldwide, with millions of infected computers, has used a UDP-based peer-to-peer protocol for updating peer IP addresses and for payload metadata communications. A number of flaws have been uncovered in this botnet's UDP-based peer-to-peer protocol, which has resulted in a novel way to sinkhole a significant number of the infected peers in the real world. Symantec's sinkhole scenario prevents individual peers from receiving and spreading malicious payloads.

The sinkhole operation was running in network simulation only. However, after an update to the botnet suddenly made about half the infected computers immune to the devised sinkholing method, the decision was made to immediately sinkhole the remaining botnet's UDP network. The Symantec Attack Investigation Team will describe the amount of effort required to successfully sinkhole the botnet and share the technical details of our sinkhole operation (development, deployment and measure of success). VB2013 participants will see internal Symantec data and statistics on the size of the botnet and the number of bots we successfully sinkholed.

VB2013 takes place 2-4 October 2013 in Berlin, Germany.

The full programme for VB2013, including abstracts for each paper, can be viewed here.

Click here for more details about the conference.



twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.