We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

The Hail Mary Cloud And The Lessons Learned

Formal Metadata

Title
The Hail Mary Cloud And The Lessons Learned
Subtitle
The Future Of Botnets: Low Intensity, Distributed
Title of Series
Number of Parts
26
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date2013
LanguageEnglish

Content Metadata

Subject Area
Genre
Abstract
There was a time when brute force attacks were all rapid-fire and easily blackholed on sight. That changed during the late 2000s: The low intensity, widely distributed password guessing botnet dubbed "The Hail Mary Cloud" that made its debut in 2007 was remarkable for three things: - the service it targeted was SSH, an almost exclusively Unixish-based phenomenon - the glacial pace of attack from each of the participants - the apparent stay-below-the-radar profile Against ridiculous odds and eventually even some media focus, the botnet apparently thrived for several years. This session presents the known facts as seen by an early observer, proceeds to an analysis of the patterns observed during the various encounters with the phenomenon, with conclusions that may have implications for current detection and prevention stratgies and points to remember when formulating future approaches to network security.