Besides hosting C&C servers for malware and scams, botnets are also used to perform automated attacks such as automatically collecting website information, injecting SQL statements and trying wrong on password libraries to steal passwords. .
Researchers believe that the malware-infected device used as a malware host has changed, by installing the proxy package on each host so that it appears on the Internet and transferring traffic to the botnet operator.
When someone wants to connect to the infected page, the DNS server will issue the IP of the currently infected host that is hosting the domain at that time.
Infected IP (via proxy package) will then redirect traffic to the actual infected page, hosted elsewhere. Researchers must pay attention not to record DNS as a real host for the site.
A closer look at the structure of the botnet, the researchers found that the entire structure is made up of two separate parts - the host network (to host and redirect traffic to the infected site) and the C&C network (C&C structure). of the botnet, not another active C&C host server).
Each subnet has its own boojIP to host a temporary domain before moving to another domain. Most IPs come from Ukraine, Russia and Romania. The combination of subnets of botnets is also very different.
Most IPs contain private IPs, like 10.xxx, 192.168.xx, meaning they are hosts hosted on closed, private networks. In addition, there are clues that some IPs are likely to be Fortune's top 100 companies.
Akama also analyzed ports for all IPs and found that most host networks have ports 80 and 443 (specifically for each proxy server), and most C&C networks have ports 7547.
This is very unusual because 7547 is a separate port for the TR-069 protocol used to manage remote routers and modems. This also reveals the types of devices used to create botnets.
Currently, there seems to be a shift in the IoT botnet market from using DDoS attacks to redirecting malicious traffic.
Akamai has not yet made a final conclusion about the structure of botnets or devices that make botnets as routers, IoT devices, computers . These are just observations. Research is still ongoing.