![]() ![]() GTbot was based on the mIRC client, which meant that it could run custom scripts in response to IRC events and also importantly that it had access to raw TCP and UDP sockets, making it perfect for rudimentary Denial of Service attacks, some attacks went as far as scanning for Sub7 infected hosts and “updating” them to GTbots.Ģ002 saw a couple of notable evolutions in botnet technology with the release of both SDBot and Agobot. ![]() ![]() First up, the emergence of the Global Threat bot, or GTbot, in 2000. Notable points along the botnet timeline are numerous. These two pieces of malware (although that description would be challenged by the creator of Sub7, a certain “mobman”, he prefers the epithet Remote Administration Tool) both first surfaced in 1999 and botnet innovation has been constant since then. They both introduced the concept of the victim machine connecting to an IRC channel to listen for malicious commands. Two contenders vie for being the malware that started the botnet ball rolling Sub7 and Pretty Park – a Trojan and a Worm respectively. This article is the first in (I think) a three part series which will describe the chronology and evolution of the threat from botnets, please check back for further installments (wow, this feels like Saturday morning cinema!) ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |