Case Study: Building Ethical Judgment Capabilities: Your Botnet is My Botnet: Analysis of a Botnet Takeover

Nature and Details of the Case Study This study reports the efforts by eight researchers (Stone-Gross Brett, Cavallaro Lorenzo,Gilbert Bob, Szydlowski Martin, Kemmerer Richard, Kruegel Christopher, and Vigna Giovanni)to capture and control the Torpig (Anserin or Sinowal) botnet and examine its operations for tendays. A botnet is a network of malware-infected machines often operated by […]

To start, you can

Nature and Details of the Case Study

This study reports the efforts by eight researchers (Stone-Gross Brett, Cavallaro Lorenzo,
Gilbert Bob, Szydlowski Martin, Kemmerer Richard, Kruegel Christopher, and Vigna Giovanni)
to capture and control the Torpig (Anserin or Sinowal) botnet and examine its operations for ten
days. A botnet is a network of malware-infected machines often operated by cybercriminals with
the intention of stealing sensitive information, including financial details like bank account
details or security details. Torpig is a particularly insidious and complex malware program (bot)
designed to retrieve sensitive data (credit card and bank account details) from victims (Stone-
Gross et al., 1).
During the ten days, the researchers (principal actors) collected and observed data from
over 180,000 infected victims’ machines while recording over 70 GB of information the Torpig
botnet had gathered. The victims, in this case, refer to individuals whose computers were
unknowingly attacked by the Torpig malware. According to the IEEE, the Torpig trojan mainly
affects the victims via drive-to-download attacks. In these types of attacks, webpages on genuine
and legitimate but susceptible websites are adjusted by including HTML tags that prompt the
browsers of the victims to request the JavaScript code from a website controlled by the attackers
(3). The JavaScript code initiates several exploits against the victim’s browser and some of its
elements, including plugins and Active X controls. For successful exploits, executables are
downloaded to the servers (drive-by-download) to the victim’s computer, which is then executed.
This executable download to the victim’s machine is responsible for installing Mebroot and
injecting a DLL into the file manager, service control manager, and other apps, including

3
browsers (Opera, Firefox, and Microsoft Internet Explorer), email clients (Eudora, Outlook, and
Thunderbird), FTP clients, instant messengers (ICQ and Skype), and other system programs.
Torpig collects sensitive information from victims through phishing attacks.
In analyzing the botnet’s footprint, the researchers began by counting the ‘nid field’ that
the malware sends in its submission header. This allowed them to identify each Torpig bot
uniquely and accurately. Besides the nid, the researchers also used ver, bid, cn, and os to identify
infected machines correctly. In their data analysis, the researchers identified that over 410
financial institutions (online trading platforms, banks, and investment firms) and 8,310 accounts
were targeted by the Torpig malware in the US (60 institutions and 4,287 accounts), Italy (34 and
1,459), Denmark (122 and 641), Spain (18 and 228), Poland (14 and 102), and others (162 and
1,593). The top five targeted institutions include Chase Bank (217), E-Trade (304), Capital One
(314), Poste Italiane (765), and PayPal (1,7700) (Stone-Gross et al., 1).
A significant proportion (28%) of the sensitive victim financial information stolen by the
botnet was retrieved from browser password managers instead of intercepting login sessions.
This is because Torpig leverages various data formats to upload hijacked credentials from
multiple sources. By geolocating IP addresses, the researchers established that the most
significant proportion of card theft victims were from the US (49%), followed by Italy (12%) and
Spain (8%). The most common cards attacked were Discover (24), Maestro (36), American
Express (81), Master Card (447), and Visa (1,056).
Ethical Principles: Supporting and Contradicting the Actions of the Principal Actors
When collecting their data, the researchers (principal actors) were cautious with the
information gathered and the commands rendered to infected hosts. They operated their C&C
servers based on the established ethical and legal principles. They specifically protected their

4
victims (research participants) based on two established principles: (1) the sinkhole botnet must
be operated to minimize any potential target attacks or damage/harm to the victims, and (2) the
sinkhole botnet must gather adequate data to allow remediation and notification of affected
parties. In compliance with the first principle, the researchers answered with an ‘okn’ when the
bot contacted their server and never sent new configuration files with a unique HTML injection
server IP address. For principle two, the researchers collaborated with internet service providers
(ISPs) and security agencies, including the FBI and US Department of Defense cybercrime units,
to assist with this effort. These actions protected the sensitive information of victims (Dittrich et
al., 1).
The only undoing when it comes to applying the two principles is the failure of the
researchers to delete data from servers regularly (this led to the delisting of the Torpig domain
owned by the criminals due to security concerns). Furthermore, the researchers did not store data
offline in an encrypted format. Finally, they failed to work with the security departments of the
financial institutions (victims).

Justification for the Actions of the Principal Actors

I agree with the two decisions (operating the sinkhole botnet to minimize any potential
target attacks or damage/harm to the victims and gathering adequate data to allow for
remediation and notification of law enforcement agencies and ISPs) by the researchers because
of the need to protect participants/victims from potential harm, as exposing their credentials
might increase their vulnerability to cybercriminals operating the Torpig botnet, and the need to
improve security and vigilance. For instance, responding with an ‘okn’ message when contacted
by the bot ensured that the bots only maintained contact with the researchers’ servers instead of
the servers of the financial institutions and other potential victims. Working with ISPs and law

5
enforcement agencies like the DoD and the FBI cybercrime units ensured adequate surveillance
and security measures were in place to protect victims.

6

Source List

  1. Stone-Gross Brett, Cavallaro Lorenzo, Gilbert Bob, Szydlowski Martin, Kemmerer
    Richard, Kruegel Christopher, and Vigna Giovanni. 2009. Your Botnet is My Botnet: An
    Analysis of a Botnet Takeover. Conference: Proceedings of the 2009 ACM Conference on
    Computer and Communications Security, CCS 2009, Chicago, Illinois, USA.
    https://www.researchgate.net/publication/221609438_Your_botnet_is_my_botnet_Analys
    is_of_a_botnet_takeover
  2. Dittrich David, Leder Felix, and Werner Tillmann. 2010. A Case Study in Ethical
    Decision Making Regarding Remote Mitigation of Botnets. Conference: Financial
    Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR, and WLC 2010,
    Tenerife, Canary Islands, Spain.
    https://www.researchgate.net/publication/220797066_A_Case_Study_in_Ethical_Decisio
    n_Making_Regarding_Remote_Mitigation_of_Botnets
  3. IEEE. 2011. Analysis of a botnet takeover.
    https://sites.cs.ucsb.edu/~chris/research/doc/spmagazine11_torpig.pdf

Calculate the price of your order

Select your paper details and see how much our professional writing services will cost.

We`ll send you the first draft for approval by at
Price: $36
  • Freebies
  • Format
  • Formatting (MLA, APA, Chicago, custom, etc.)
  • Title page & bibliography
  • 24/7 customer support
  • Amendments to your paper when they are needed
  • Chat with your writer
  • 275 word/double-spaced page
  • 12 point Arial/Times New Roman
  • Double, single, and custom spacing
  • We care about originality

    Our custom human-written papers from top essay writers are always free from plagiarism.

  • We protect your privacy

    Your data and payment info stay secured every time you get our help from an essay writer.

  • You control your money

    Your money is safe with us. If your plans change, you can get it sent back to your card.

How it works

  1. 1
    You give us the details
    Complete a brief order form to tell us what kind of paper you need.
  2. 2
    We find you a top writer
    One of the best experts in your discipline starts working on your essay.
  3. 3
    You get the paper done
    Enjoy writing that meets your demands and high academic standards!

Samples from our advanced writers

Check out some essay pieces from our best essay writers before your place an order. They will help you better understand what our service can do for you.

Get your own paper from top experts

Order now

Perks of our essay writing service

We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.

  • Swift delivery
    Our writing service can deliver your short and urgent papers in just 4 hours!
  • Professional touch
    We find you a pro writer who knows all the ins and outs of your subject.
  • Easy order placing/tracking
    Create a new order and check on its progress at any time in your dashboard.
  • Help with any kind of paper
    Need a PhD thesis, research project, or a two-page essay? For you, we can do it all.
  • Experts in 80+ subjects
    Our pro writers can help you with anything, from nursing to business studies.
  • Calculations and code
    We also do math, write code, and solve problems in 30+ STEM disciplines.

Take your studies to the next level with our experienced specialists