Tuesday, December 10, 2024

Bots ‘Dangerous’ to Corporate Networks

Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

Think your corporate network is safe from a bot attack? Think there’s no

way one of your user’s machines is part of a botnet?

Think again.

Bot attacks are quickly becoming a critical security issue for IT and

security administrators, according to industry watchers. And it’s an

issue that will need to garner more attention in coming months.

”This is extremely dangerous to corporate networks,” says Carl Banzhof,

CTO of Dallas-based Citadel Security Software. ”Corporate networks have

large concentrations of systems that can be taken over relatively easily

by these bots. A laptop that’s infected will come in, or someone on a

desktop will open an email or visit a site that they shouldn’t, and then

[the bot] is on the network. It will automatically start looking for

other computers, and it has an arsenal of exploits in its pocket to

attack unsuspecting machines.”

Once the bot has circulated to other machines on the corporate network, a

remote hacker would have the ability to toy with the company — changing

information, stealing files, encrypting data or even shutting down the

network.

”These things are more of a threat than IT managers generally suspect,”

adds Banzhof.

Bots got quite a bit of attention last week when Zotob led the charge

against networks that hadn’t yet updated a patch for a plug-and-play flaw

in Microsoft Windows. But despite the momentary attention, information

about bots often takes a far back seat to information coming out on

worms, viruses and Trojan horses.

And there has been some confusion over the differences between bots,

worms and Trojans.

A bot is not a virus or a Trojan. A bot often is the payload in a virus,

explains David Perry, global director of education at TrendMicro Inc., an

anti-virus company based in Tokyo.

The bot is a piece of code that takes

control of the infected computer and reports back to a remote master

control program run by the bot writer. Computers also can be infected by

bots by visiting a malicious Website or chat room.

The hacker tries to cultivate as many infected machines as possible,

building a virtual army of zombie machines — also referred to as a

botnet. Once this botnet is in place, the hacker can use it to send out

spam or launch denial-of-service attacks.

Steve Sundermeier, a vice president at Central Command, an anti-virus and

anti-spam company based in Medina, Ohio, says a large enough botnet could

be used to interrupt the Internet.

”The more bots, the more infected

machines with these bots, the greater control virus authors have,” says

Sundermeier. ”The greater the army, the greater the possibility of

destruction. I think there’s a lot of theories about this huge army of

bots out there that have the opportunity to take down the Internet or

raise other havoc. The possibility may exist. We just haven’t seen it

yet, thank goodness.”

But Sundermeier says what may be more troubling to IT and security

administrators is the ability of bots to make their way into a corporate

network and take control of it.

A Bot on Your Network?

”Probably tens of thousands of companies have computers that are part of

a botnet,” he adds. ”If you have a bot in your company, you could have

information leaking out.”

Gregg Mastoras at Sophos, Inc., an anti-virus and anti-spam company with

U.S. headquarters in Lynnfield, Mass., says most CIOs or administrators

he talks to are quite sure they don’t have any bots on their network. And

then they’re shocked when he finds them.

”The numbers speak for themselves,” Mastoras says. ”Fifty percent of all spam

now originates from botnets. That’s up from 40 percent six months ago.

And it’s not just all from consumer machines. That’s a misnomer. The

reality is that very clearly many organizations are infected and don’t

even know about it.

”We track where spam is coming from and we communicate with the

organization sending it, saying, ‘Do you know you’re sending out spam on

Rolex watches?’ We’re talking about thousands of organizations in the

U.S. alone that are affected by it.”

And Banzhof says we’re very close to a time when someone could hire a

hacker with a botnet to infiltrate a specific company and steal data.

”Actually, it might even exist today,” says Banzhof. ”You hire a

botnet to hit a company and seek out and return specific information for

you. That could be facilitated every day in underground message boards.

It’s usually for scamming but it could be used for corporate espionage or

cyber warfare even.”

Eric Yoshizuru, a product manager with Glendale, Calif.-based Panda

Software, says stealing information could be just the beginning of a

company’s troubles.

”It could be very bad depending on what kind of

information that user has access to. If they have access to a database

with people’s credit card information, then the whole company’s

reputation is at stake. If they take over enough computers in the

network, they could actually shut it down… They could take critical

files and encrypt them and then basically hold them hostage.”

Analysts say keeping a system updated with the latest patches and keeping

anti-virus software updated should take care of bot attacks. And all of

that would be taken care of in a perfect world. But in a world where IT

workers are short-handed, budgets are tight and there literally are more

patches than one IT shop can hope to handle, bots are becoming a real

problem to deal with.

Subscribe to Data Insider

Learn the latest news and best practices about data science, big data analytics, artificial intelligence, data security, and more.

Similar articles

Get the Free Newsletter!

Subscribe to Data Insider for top news, trends & analysis

Latest Articles