[ISN] Russian hosting network running a protection racket, researcher says

From: InfoSec News (alerts@private)
Date: Tue Feb 19 2008 - 22:38:17 PST


http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=security&articleId=9063418

By Gregg Keizer
February 19, 2008 
Computerworld
 
The Russian Business Network, a notorious hacker and malware hosting 
network, runs a protection racket that extorts as much as $2,000 a month 
in fees for "protective Web services" from borderline sites, a 
researcher alleged today.

The RBNExploit blog -- which is authored by one or more anonymous 
researchers -- spelled out the racket run by the group, which is thought 
to be headquartered in St. Petersburg, Russia, and has been pegged by 
security professionals as a major source of malware and cybercriminal 
activity.

"The business model RBN uses is quite simple and effective," said a post 
published today on the blog. "Its affiliates and resellers comb various 
niche market forums and discussion areas for Web masters using or 
discussing protective web services, i.e. DDoS [Distributed Denial of 
Service] prevention. Carry out a DDoS attack on the Web site and then 
provide a third-party sales approach to the Web master to 'encourage' a 
sign-up for their DDoS prevention services."

The price for "protection:" $2,000 per month.

The DDoS attacks are, like almost all such mass attacks, conducted by a 
botnet, an army of previously-compromised computers that can be told to 
hammer a site one day and spew huge quantities of spam the next. 
Numerous researchers, for example, have linked the RBN to the Storm 
botnet, an amorphous collection of PCs that have been infected with a 
Trojan by the same name. Some security experts have put the blame for a 
massive series of DDoS attacks against Estonian government sites last 
year on the RBN.

RBNExploit noted that the domains that have recently shifted to RBN's 
hosting services included sites involved in pornography, online 
pharmaceutical sales and what it calls "HYIP," for High Yield Investment 
Programs -- a term that's become synonymous with investment scams, often 
in the form of traditional Ponzi schemes. "RBN is successful, as most of 
these Web masters are not about to publically complain," noted the blog.

It also posted a link to an HYIP forum where discussions of RBN DDoS 
extortions appeared several times. "Paid very fast. A very good return 
from a ddos attack," wrote one users on the scam's message board in 
early December 2007.

"Very good support work while ddos!" added another. "I am very happy 
with your fast payments! THx!"

The blog traced the anti-DDoS hosting services to an IP address it had 
previously fingered as a "core replacement server" for RBN in St. 
Petersburg. It also listed several domains, including the HYIP "Golden 
Pig" and several drug-selling sites, that have recently moved to the RBN 
servers handling anti-attack hosting. Among the latter: 
TheCanadianMeds.com and OfficialMedicines.com. Both those sites are now 
hosted on RBN servers based in Turkey, said the blog, and they have 
previously been blacklisted by SpamHaus.org, a well-known antispam 
organization.

Phone numbers listed in the domain registration records for those sites 
were either incomplete, and thus unusable, or rang through to a fax 
machine.


___________________________________________________      
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn 



This archive was generated by hypermail 2.1.3 : Tue Feb 19 2008 - 22:49:43 PST